| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
| authorize_localname.c | 44 krb5_principal princ = (krb5_principal)input_name; local 63 user_ok = krb5_kuserok(context, princ, user);
|
| pname_to_uid.c | 45 krb5_const_principal princ = (krb5_const_principal)pname; local 52 ret = krb5_aname_to_localname(context, princ,
|
| export_name.c | 45 krb5_const_principal princ = (krb5_const_principal)input_name; local 52 kret = krb5_unparse_name (context, princ, &name);
|
| import_name.c | 44 krb5_principal princ; local 47 kerr = krb5_parse_name (context, name, &princ); 50 *output_name = (gss_name_t)princ; 134 krb5_principal princ = NULL; local 154 kerr = krb5_make_principal(context, &princ, "", tmp, host, NULL); 162 krb5_principal_set_type(context, princ, KRB5_NT_SRV_HST); 163 *output_name = (gss_name_t)princ;
|
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| add_enctype.c | 46 kadm5_principal_ent_rec princ; local 60 memset(&princ, 0, sizeof(princ)); 84 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 93 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) { 98 new_key_data = calloc(princ.n_key_data + n_etypes, 105 for (i = 0; i < princ.n_key_data; ++i) { 106 krb5_key_data *key = &princ.key_data[i]; 121 int n = princ.n_key_data + i [all...] |
| check.c | 69 kadm5_principal_ent_rec princ; local 77 memset (&princ, 0, sizeof(princ)); 78 ret = kadm5_get_principal(kadm_handle, principal, &princ, 86 for (i = 0; i < princ.n_key_data; i++) { 89 princ.key_data[i].key_data_type[0], 91 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { 94 name, princ.key_data[i].key_data_type[0], 95 (unsigned long)princ.key_data[i].key_data_length); 100 kadm5_free_principal_ent(kadm_handle, &princ); [all...] |
| del_enctype.c | 46 kadm5_principal_ent_rec princ; local 56 memset (&princ, 0, sizeof(princ)); 79 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 87 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) { 92 new_key_data = malloc(princ.n_key_data * sizeof(*new_key_data)); 93 if (new_key_data == NULL && princ.n_key_data != 0) { 98 for (i = 0, j = 0; i < princ.n_key_data; ++i) { 100 key = &princ.key_data[i] [all...] |
| ext.c | 48 kadm5_principal_ent_rec princ; local 61 ret = kadm5_get_principal(kadm_handle, principal, &princ, mask); 70 if (princ.n_key_data == 0) { 84 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) { 89 if (kadm5_some_keys_are_bogus(princ.n_key_data, princ.key_data)) { 93 keys = calloc(sizeof(*keys), princ.n_key_data); 98 for (i = 0; i < princ.n_key_data; i++) { 99 krb5_key_data *kd = &princ.key_data[i] [all...] |
| init.c | 45 create_random_entry(krb5_principal princ, 63 ret = krb5_unparse_name(context, princ, &name); 70 ent.principal = princ; 94 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys); 103 ret = kadm5_get_principal(kadm_handle, princ, &ent, 168 krb5_principal princ; local 186 ret = krb5_make_principal(context, &princ, realm, 191 create_random_entry(princ, max_life, max_rlife, 0, 0); 192 krb5_free_principal(context, princ); 198 krb5_make_principal(context, &princ, realm [all...] |
| mod.c | 40 add_tl(kadm5_principal_ent_rec *princ, int type, krb5_data *data) 50 princ->n_tl_data++; 51 ptl = &princ->tl_data; 61 kadm5_principal_ent_rec *princ, 104 add_tl(princ, KRB5_TL_EXTENSION, &buf); 108 add_aliases(krb5_context contextp, kadm5_principal_ent_rec *princ, 154 add_tl(princ, KRB5_TL_EXTENSION, &buf); 158 add_pkinit_acl(krb5_context contextp, kadm5_principal_ent_rec *princ, 194 add_tl(princ, KRB5_TL_EXTENSION, &buf); 198 add_kvno_diff(krb5_context contextp, kadm5_principal_ent_rec *princ, 232 kadm5_principal_ent_rec princ; local [all...] |
| ank.c | 40 * fetch the default principal corresponding to `princ' 45 krb5_principal princ, 50 krb5_const_realm realm = krb5_principal_get_realm(contextp->context, princ); 82 kadm5_principal_ent_rec princ, defrec; local 89 memset(&princ, 0, sizeof(princ)); 95 princ.principal = princ_ent; 98 ret = set_entry(context, &princ, &mask, 115 set_defaults(&princ, &mask, default_ent, default_mask); 117 if(edit_entry(&princ, &mask, default_ent, default_mask) [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| misc.c | 70 krb5_const_principal princ; local 112 princ = principal; 114 princ = enterprise_principal; 118 princ,
|
| string2key.c | 103 krb5_principal princ; local 168 ret = krb5_parse_name(context, principal, &princ); 171 ret = krb5_get_pw_salt(context, princ, &salt);
|
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| get_princs_s.c | 48 add_princ(struct foreach_data *d, char *princ) 55 d->princs[d->count++] = princ; 63 char *princ; local 65 ret = krb5_unparse_name(context, ent->entry.principal, &princ); 69 if(fnmatch(d->exp, princ, 0) == 0 || fnmatch(d->exp2, princ, 0) == 0) 70 ret = add_princ(d, princ); 72 free(princ); 74 ret = add_princ(d, princ); 77 free(princ); [all...] |
| acl.c | 75 * retrieve the right for the current caller on `princ' (NULL means all) 82 krb5_const_principal princ, 126 if (princ != NULL) { 134 princ, pattern_princ); 154 krb5_principal princ; local 157 ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ); 160 ret = krb5_principal_compare(context->context, context->caller, princ); 161 krb5_free_principal(context->context, princ); 202 * `op' on `princ' and otherwise an error 203 * princ == NULL if it's not relevant [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| test_princ.c | 46 const char *princ = "lha@SU.SE"; local 56 ret = krb5_parse_name(context, princ, &p); 64 if (strcmp(princ, princ_unparsed)) { 65 krb5_errx(context, 1, "%s != %s", princ, princ_unparsed); 122 if (strcmp(princ, princ_unparsed)) 123 krb5_errx(context, 1, "'%s' != '%s'", princ, princ_unparsed); 144 if (strcmp(princ, princ_unparsed) == 0) 145 krb5_errx(context, 1, "%s == %s", princ, princ_unparsed); 150 ret = krb5_parse_name(context, princ, &p2); 161 if (strcmp(princ, princ_unparsed) [all...] |
| parse-name-test.c | 83 krb5_principal princ; local 88 ret = krb5_parse_name(context, t->input_string, &princ); 92 if (strcmp (t->realm, princ->realm) != 0) { 95 princ->realm, t->realm, 100 if (t->ncomponents != princ->name.name_string.len) { 103 princ->name.name_string.len, t->ncomponents, 109 princ->name.name_string.val[i]) != 0) { 113 princ->name.name_string.val[i], 121 ret = krb5_unparse_name_fixed(context, princ, 130 ret = krb5_unparse_name_fixed(context, princ, [all...] |
| test_alname.c | 67 char *princ; local 73 ret = krb5_unparse_name(context, p, &princ); 81 free(princ); 85 princ, localuser); 86 free(princ); 141 krb5_principal princ; local 149 ret = krb5_parse_name(context, argv[0], &princ); 153 ret = krb5_unparse_name(context, princ, &unparsed); 162 ret = krb5_aname_to_localname(context, princ, lname_size, localname); 188 krb5_free_principal(context, princ); [all...] |
| test_canon.c | 52 krb5_principal princ = NULL; local 102 retval = krb5_sname_to_principal(context, hostname, "host", KRB5_NT_SRV_HST, &princ); 106 retval = krb5_unparse_name(context, princ, &unparsed); 117 eq = krb5_principal_compare(context, princ, cmp_to_princ); 132 in_creds.server = princ; 150 retval = krb5_kt_get_entry(context, kt, princ, 0, 0, &ktent); 162 krb5_free_principal(context, princ);
|
| /src/crypto/external/bsd/openssh/dist/ |
| gss-serv-krb5.c | 85 krb5_principal princ; local 93 &princ))) { 99 if (krb5_kuserok(krb_context, princ, name)) { 106 krb5_free_principal(krb_context, princ); 119 krb5_principal princ; local 141 client->exportedname.value, &princ))) { 149 if ((problem = krb5_cc_initialize(krb_context, ccache, princ))) { 153 krb5_free_principal(krb_context, princ); 158 krb5_free_principal(krb_context, princ);
|
| /src/crypto/external/bsd/heimdal/dist/admin/ |
| change.c | 179 krb5_principal princ; local 181 ret = krb5_parse_name (context, argv[i], &princ); 186 if (krb5_principal_compare (context, princ, entry.principal)) 189 krb5_free_principal (context, princ);
|
| get.c | 128 kadm5_principal_ent_rec princ; local 141 memset(&princ, 0, sizeof(princ)); 142 princ.principal = princ_ent; 144 princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX; 146 princ.princ_expire_time = 0; 163 ret = kadm5_create_principal(kadm_handle, &princ, mask, "x"); 180 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 190 if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX)) 192 princ.attributes &= (~KRB5_KDB_DISALLOW_ALL_TIX) [all...] |
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kcpytkt.c | 82 char *princ; local 128 ret = krb5_unparse_name(context, in_creds.server, &princ); 145 krb5_warn(context, ret, "Can't retrieve credentials for %s", princ); 147 krb5_free_unparsed_name(context, princ); 158 krb5_warn(context, ret, "Can't store credentials for %s", princ); 161 krb5_free_unparsed_name(context, princ); 167 krb5_free_unparsed_name(context, princ);
|
| kdeltkt.c | 81 char *princ; local 123 ret = krb5_unparse_name(context, in_creds.server, &princ); 140 krb5_warn(context, ret, "Can't retrieve credentials for %s", princ); 142 krb5_free_unparsed_name(context, princ); 153 krb5_warn(context, ret, "Can't remove credentials for %s", princ); 156 krb5_free_unparsed_name(context, princ); 162 krb5_free_unparsed_name(context, princ);
|
| /src/usr.bin/login/ |
| k5login.c | 127 krb5_principal princ; local 134 kerror = krb5_sname_to_principal(c, 0, 0, KRB5_NT_SRV_HST, &princ); 143 kerror = krb5_kt_read_service_key(c, NULL, princ, 0, 0, &kb); 186 princ, NULL, NULL, &ticket); 222 krb5_free_principal(c, princ);
|