Searched refs:realm (Results 1 - 25 of 139) sorted by relevance

123456

/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dappdefault.c38 krb5_const_realm realm, const char *option,
47 if(realm != NULL)
49 "realms", realm, option, NULL);
55 if(realm != NULL)
58 realm,
67 if(realm != NULL)
71 realm,
80 krb5_const_realm realm, const char *option,
88 if(realm != NULL)
90 "realms", realm, optio
37 krb5_appdefault_boolean(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, krb5_boolean def_val, krb5_boolean *ret_val) argument
79 krb5_appdefault_string(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, const char *def_val, char **ret_val) argument
123 krb5_appdefault_time(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, time_t def_val, time_t *ret_val) argument
[all...]
H A Dasn1_glue.c51 const Realm realm)
64 p->realm = strdup(realm);
65 if (p->realm == NULL) {
48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
H A Dset_default_realm.c63 * Set the knowledge of the default realm(s) in `context'.
64 * If realm != NULL, that's the new default realm.
65 * Otherwise, the realm(s) are figured out from configuration or DNS.
70 const char *realm)
75 if (realm == NULL) {
83 ret = string_to_list (context, realm, &realms);
69 krb5_set_default_realm(krb5_context context, const char *realm) argument
H A Dtest_alname.c38 test_alname(krb5_context context, krb5_const_realm realm, argument
47 ret = krb5_make_principal(context, &p, realm, user, inst, NULL);
102 krb5_realm realm; local
131 ret = krb5_get_default_realm(context, &realm);
135 test_alname(context, realm, user, NULL, user, 1);
136 test_alname(context, realm, user, "root", "root", 1);
141 test_alname(context, realm, user, NULL,
143 test_alname(context, realm, user, "root",
H A Dtransited.c42 char *realm; member in struct:tr_realm
56 free(p->realm);
91 tmp->realm = strdup(p);
92 if(tmp->realm == NULL){
112 tmp->realm = malloc(p - from + 1);
113 if(tmp->realm == NULL){
118 memcpy(tmp->realm, from, p - from);
119 tmp->realm[p - from] = '\0';
143 if(r->realm[0] == '\0'){
144 while(r->next && r->next->realm[
206 make_realm(char *realm) argument
[all...]
H A Dmk_error.c75 msg.realm = server->realm;
78 static char unspec[] = "<unspecified realm>";
79 msg.realm = unspec;
82 msg.crealm = &client->realm;
H A Dget_default_realm.c57 * Return the first default realm. For compatibility.
62 krb5_realm *realm)
81 *realm = res;
61 krb5_get_default_realm(krb5_context context, krb5_realm *realm) argument
H A Dinit_creds.c105 const char *realm,
113 realm,
130 const char *realm,
136 "realms", realm, name, NULL);
148 * application `appname' (default to getprogname() if NULL), and realm
149 * `realm'. First looks in [appdefaults] but falls back to
156 krb5_const_realm realm,
163 realm, "forwardable");
164 krb5_appdefault_boolean(context, appname, realm, "forwardable", b, &b);
167 b = get_config_bool (context, FALSE, realm, "proxiabl
104 get_config_time(krb5_context context, const char *realm, const char *name, int def) argument
128 get_config_bool(krb5_context context, krb5_boolean def_value, const char *realm, const char *name) argument
154 krb5_get_init_creds_opt_set_default_flags(krb5_context context, const char *appname, krb5_const_realm realm, krb5_get_init_creds_opt *opt) argument
[all...]
H A Dkrbhst.c52 * `proto', `proto', `realm' using `dns_type'.
58 const char *realm, const char *dns_type,
86 snprintf(domain, sizeof(domain), "_%s._%s.%s.", service, proto, realm);
144 char *realm; member in struct:krb5_krbhst_data
189 return handle->realm;
441 ret = srv_find_realm(context, &res, &count, kd->realm, "SRV", proto, service,
443 _krb5_debug(context, 2, "searching DNS for realm %s %s.%s -> %d",
444 kd->realm, proto, service, ret);
464 "realms", kd->realm, conf_string, NULL);
466 _krb5_debug(context, 2, "configuration file for realm
57 srv_find_realm(krb5_context context, krb5_krbhst_info ***res, int *count, const char *realm, const char *dns_type, const char *proto, const char *service, int port) argument
866 common_init(krb5_context context, const char *service, const char *realm, int flags) argument
899 krb5_krbhst_init(krb5_context context, const char *realm, unsigned int type, krb5_krbhst_handle *handle) argument
908 krb5_krbhst_init_flags(krb5_context context, const char *realm, unsigned int type, int flags, krb5_krbhst_handle *handle) argument
1017 gethostlist(krb5_context context, const char *realm, unsigned int type, char ***hostlist) argument
1063 krb5_get_krb_admin_hst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument
1075 krb5_get_krb_changepw_hst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument
1087 krb5_get_krb524hst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument
1100 krb5_get_krbhst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument
[all...]
H A Dbuild_ap_req.c56 copy_Realm(&cred->server->realm, &ap.ticket.realm);
H A Dprincipal.c39 * realm the principal belongs to and the former is a list of 0 or
64 #define princ_realm(P) ((P)->realm)
128 * Get the realm of the principal
131 * @param principal principal to get the realm for
133 * @return realm of the principal, don't free or use after krb5_principal is freed
194 heim_general_string realm = NULL; local
214 N_("Can't require both realm and "
215 "no realm at the same time", ""));
279 N_("part after realm in principal name", ""));
301 N_("part after realm i
664 krb5_principal_set_realm(krb5_context context, krb5_principal principal, krb5_const_realm realm) argument
696 krb5_build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument
725 krb5_make_principal(krb5_context context, krb5_principal *principal, krb5_const_realm realm, ...) argument
801 build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, void (*func)(krb5_context, krb5_principal, va_list), va_list ap) argument
832 krb5_build_principal_va(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument
842 krb5_build_principal_va_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument
853 krb5_build_principal_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument
[all...]
H A Dtest_plugin.c52 const char *realm,
69 if (strcmp(realm, "NOTHERE.H5L.SE") == 0)
50 resolve_lookup(void *ctx, enum locate_service_type service, const char *realm, int domain, int type, int (*add)(void *,int,struct sockaddr *), void *addctx) argument
H A Dparse-name-test.c41 krb5_realm realm; member in struct:testcase
76 /* to enable realm-less principal name above */
90 if (strcmp (t->realm, princ->realm) != 0) {
91 printf ("wrong realm (\"%s\" should be \"%s\")"
93 princ->realm, t->realm,
/freebsd-11-stable/crypto/heimdal/kadmin/
H A Dcheck.c108 char *realm = NULL, *p, *p2; local
112 ret = krb5_get_default_realm(context, &realm);
118 realm = strdup(argv[0]);
119 if (realm == NULL) {
131 if (asprintf(&p, "%s/%s@%s", KRB5_TGS_NAME, realm, realm) == -1) {
138 printf("%s doesn't exist, are you sure %s is a realm in your database",
139 p, realm);
151 if (asprintf(&p, "kadmin/admin@%s", realm) == -1) {
171 if (asprintf(&p, "kadmin/changepw@%s", realm)
[all...]
H A Dkadmin.c44 static char *realm; variable
67 "realm", 'r', arg_string, &realm,
68 "realm to use", "realm"
187 if(realm) {
188 krb5_set_default_realm(context, realm); /* XXX should be fixed
190 conf.realm = realm;
H A Dinit.c158 const char *realm = argv[i]; local
175 ret = krb5_make_principal(context, &princ, realm,
176 KRB5_TGS_NAME, realm, NULL);
187 krb5_make_principal(context, &princ, realm,
205 krb5_make_principal(context, &princ, realm,
211 krb5_make_principal(context, &princ, realm,
220 krb5_make_principal(context, &princ, realm,
228 krb5_make_principal(context, &princ, realm,
242 krb5_make_principal(context, &ent.principal, realm,
/freebsd-11-stable/crypto/heimdal/lib/kafs/
H A Dkafs.h110 int krb_afslog (const char *cell, const char *realm);
111 int krb_afslog_uid (const char *cell, const char *realm, uid_t uid);
112 int krb_afslog_home (const char *cell, const char *realm,
114 int krb_afslog_uid_home (const char *cell, const char *realm, uid_t uid,
117 int krb_realm_of_cell (const char *cell, char **realm);
157 krb5_const_realm realm,
162 krb5_const_realm realm);
166 krb5_const_realm realm,
173 krb5_const_realm realm,
176 krb5_error_code krb5_realm_of_cell (const char *cell, char **realm);
[all...]
H A Dcommon.c265 const char *cell, char **realm, int exact)
303 *realm = (*data->get_realm)(data, p);
304 if (*realm && **realm != '\0')
314 /* Find the realm associated with cell. Do this by opening CellServDB
315 file and getting the realm-of-host for the first VL-server for the
318 This does not work when the VL-server is living in one realm, but
319 the cell it is serving is living in another realm.
326 const char *cell, char **realm)
331 ret = file_find_cell(data, cell, realm,
264 file_find_cell(struct kafs_data *data, const char *cell, char **realm, int exact) argument
325 _kafs_realm_of_cell(struct kafs_data *data, const char *cell, char **realm) argument
343 _kafs_try_get_cred(struct kafs_data *data, const char *user, const char *cell, const char *realm, uid_t uid, struct kafs_token *kt) argument
366 _kafs_get_cred(struct kafs_data *data, const char *cell, const char *realm_hint, const char *realm, uid_t uid, struct kafs_token *kt) argument
[all...]
H A Dafskrb5.c39 krb5_const_realm realm; member in struct:krb5_kafs_data
147 const char *realm, uid_t uid, struct kafs_token *kt)
157 realm, name, inst, NULL);
188 (inst != NULL && inst[0] != '\0') ? inst : realm, kt);
215 const char *trealm; /* ticket realm */
228 ret = _kafs_get_cred(data, cell, d->realm, trealm, uid, &kt);
255 krb5_const_realm realm,
282 d.realm = realm;
296 krb5_const_realm realm,
146 get_cred(struct kafs_data *data, const char *name, const char *inst, const char *realm, uid_t uid, struct kafs_token *kt) argument
252 krb5_afslog_uid_home(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, uid_t uid, const char *homedir) argument
293 krb5_afslog_uid(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, uid_t uid) argument
303 krb5_afslog(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm) argument
312 krb5_afslog_home(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, const char *homedir) argument
326 krb5_realm_of_cell(const char *cell, char **realm) argument
[all...]
/freebsd-11-stable/crypto/heimdal/kcm/
H A Drenew.c45 krb5_const_realm realm; local
74 realm = krb5_principal_get_realm(context, in.client);
75 ret = krb5_make_principal(context, &in.server, realm,
76 KRB5_TGS_NAME, realm, NULL);
78 kcm_log(0, "Failed to make TGS principal for realm %s: %s",
79 realm, krb5_get_err_text(context, ret));
/freebsd-11-stable/crypto/heimdal/kdc/
H A Dannounce.c49 char *realm; member in struct:entry
158 domain_add(const char *domain, const char *realm, int flag) argument
163 if (strcmp(domain, e->domain) == 0 && strcmp(realm, e->realm) == 0) {
169 LOG("Adding realm %s to domain %s", realm, domain);
175 e->realm = strdup(realm);
176 if (e->domain == NULL || e->realm == NULL) {
178 free(e->realm);
189 const char *realm; member in struct:addctx
232 register_srv(const char *realm, const char *hostname, int port) argument
400 update_entries(SCDynamicStoreRef store, const char *realm, int flags) argument
[all...]
/freebsd-11-stable/crypto/heimdal/lib/kadm5/
H A Ddestroy_c.c43 free(context->realm);
H A Dcontext_s.c85 if (ctx->config.realm) {
95 /* match default (realm-less) */
96 if(p != NULL && strcmp(ctx->config.realm, p) != 0)
153 (*ctx)->config.realm = strdup(params->realm);
155 krb5_get_default_realm(context, &(*ctx)->config.realm);
/freebsd-11-stable/crypto/heimdal/tools/
H A Dkdc-log-analyze.pl299 print "Cross realm statistics\n\n";
301 print "\tNumber of cross-realm tgs out: $tgs_xrealm_out\n";
303 print "\tTop ten realms used for out cross-realm:\n";
305 print "\tTop ten principals use out cross-realm:\n";
308 print "\tNumber of cross-realm tgs in: $tgs_xrealm_in\n";
310 print "\tTop ten realms used for in cross-realm:\n";
312 print "\tTop ten principals use in cross-realm:\n";
322 print "\tTop ten to realm referrals:\n";
433 } elsif (/returning a referral to realm (.*) for server (.*) that was not found/) {
437 } elsif (/krb4 Cross-realm (
[all...]
/freebsd-11-stable/crypto/heimdal/admin/
H A Dchange.c41 const char *realm, const char *admin_server, int server_port)
59 if(realm == NULL)
60 realm = krb5_principal_get_realm(context, principal);
61 conf.realm = strdup(realm);
62 if (conf.realm == NULL) {
73 free(conf.realm);
92 free(conf.realm);
39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument

Completed in 228 milliseconds

123456