HomeSort by: relevance | last modified time | path
    Searched defs:princ (Results 1 - 25 of 42) sorted by relevancy

1 2

  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
authorize_localname.c 44 krb5_principal princ = (krb5_principal)input_name; local
63 user_ok = krb5_kuserok(context, princ, user);
pname_to_uid.c 45 krb5_const_principal princ = (krb5_const_principal)pname; local
52 ret = krb5_aname_to_localname(context, princ,
export_name.c 45 krb5_const_principal princ = (krb5_const_principal)input_name; local
52 kret = krb5_unparse_name (context, princ, &name);
import_name.c 44 krb5_principal princ; local
47 kerr = krb5_parse_name (context, name, &princ);
50 *output_name = (gss_name_t)princ;
134 krb5_principal princ = NULL; local
154 kerr = krb5_make_principal(context, &princ, "", tmp, host, NULL);
162 krb5_principal_set_type(context, princ, KRB5_NT_SRV_HST);
163 *output_name = (gss_name_t)princ;
  /src/crypto/external/bsd/heimdal/dist/kadmin/
add_enctype.c 46 kadm5_principal_ent_rec princ; local
60 memset(&princ, 0, sizeof(princ));
84 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
93 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) {
98 new_key_data = calloc(princ.n_key_data + n_etypes,
105 for (i = 0; i < princ.n_key_data; ++i) {
106 krb5_key_data *key = &princ.key_data[i];
121 int n = princ.n_key_data + i
    [all...]
check.c 69 kadm5_principal_ent_rec princ; local
77 memset (&princ, 0, sizeof(princ));
78 ret = kadm5_get_principal(kadm_handle, principal, &princ,
86 for (i = 0; i < princ.n_key_data; i++) {
89 princ.key_data[i].key_data_type[0],
91 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
94 name, princ.key_data[i].key_data_type[0],
95 (unsigned long)princ.key_data[i].key_data_length);
100 kadm5_free_principal_ent(kadm_handle, &princ);
    [all...]
del_enctype.c 46 kadm5_principal_ent_rec princ; local
56 memset (&princ, 0, sizeof(princ));
79 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
87 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) {
92 new_key_data = malloc(princ.n_key_data * sizeof(*new_key_data));
93 if (new_key_data == NULL && princ.n_key_data != 0) {
98 for (i = 0, j = 0; i < princ.n_key_data; ++i) {
100 key = &princ.key_data[i]
    [all...]
ext.c 48 kadm5_principal_ent_rec princ; local
61 ret = kadm5_get_principal(kadm_handle, principal, &princ, mask);
70 if (princ.n_key_data == 0) {
84 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) {
89 if (kadm5_some_keys_are_bogus(princ.n_key_data, princ.key_data)) {
93 keys = calloc(sizeof(*keys), princ.n_key_data);
98 for (i = 0; i < princ.n_key_data; i++) {
99 krb5_key_data *kd = &princ.key_data[i]
    [all...]
init.c 45 create_random_entry(krb5_principal princ,
63 ret = krb5_unparse_name(context, princ, &name);
70 ent.principal = princ;
94 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys);
103 ret = kadm5_get_principal(kadm_handle, princ, &ent,
168 krb5_principal princ; local
186 ret = krb5_make_principal(context, &princ, realm,
191 create_random_entry(princ, max_life, max_rlife, 0, 0);
192 krb5_free_principal(context, princ);
198 krb5_make_principal(context, &princ, realm
    [all...]
mod.c 40 add_tl(kadm5_principal_ent_rec *princ, int type, krb5_data *data)
50 princ->n_tl_data++;
51 ptl = &princ->tl_data;
61 kadm5_principal_ent_rec *princ,
104 add_tl(princ, KRB5_TL_EXTENSION, &buf);
108 add_aliases(krb5_context contextp, kadm5_principal_ent_rec *princ,
154 add_tl(princ, KRB5_TL_EXTENSION, &buf);
158 add_pkinit_acl(krb5_context contextp, kadm5_principal_ent_rec *princ,
194 add_tl(princ, KRB5_TL_EXTENSION, &buf);
198 add_kvno_diff(krb5_context contextp, kadm5_principal_ent_rec *princ,
232 kadm5_principal_ent_rec princ; local
    [all...]
ank.c 40 * fetch the default principal corresponding to `princ'
45 krb5_principal princ,
50 krb5_const_realm realm = krb5_principal_get_realm(contextp->context, princ);
82 kadm5_principal_ent_rec princ, defrec; local
89 memset(&princ, 0, sizeof(princ));
95 princ.principal = princ_ent;
98 ret = set_entry(context, &princ, &mask,
115 set_defaults(&princ, &mask, default_ent, default_mask);
117 if(edit_entry(&princ, &mask, default_ent, default_mask)
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
misc.c 70 krb5_const_principal princ; local
112 princ = principal;
114 princ = enterprise_principal;
118 princ,
string2key.c 103 krb5_principal princ; local
168 ret = krb5_parse_name(context, principal, &princ);
171 ret = krb5_get_pw_salt(context, princ, &salt);
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
get_princs_s.c 48 add_princ(struct foreach_data *d, char *princ)
55 d->princs[d->count++] = princ;
63 char *princ; local
65 ret = krb5_unparse_name(context, ent->entry.principal, &princ);
69 if(fnmatch(d->exp, princ, 0) == 0 || fnmatch(d->exp2, princ, 0) == 0)
70 ret = add_princ(d, princ);
72 free(princ);
74 ret = add_princ(d, princ);
77 free(princ);
    [all...]
acl.c 75 * retrieve the right for the current caller on `princ' (NULL means all)
82 krb5_const_principal princ,
126 if (princ != NULL) {
134 princ, pattern_princ);
154 krb5_principal princ; local
157 ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
160 ret = krb5_principal_compare(context->context, context->caller, princ);
161 krb5_free_principal(context->context, princ);
202 * `op' on `princ' and otherwise an error
203 * princ == NULL if it's not relevant
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
test_princ.c 46 const char *princ = "lha@SU.SE"; local
56 ret = krb5_parse_name(context, princ, &p);
64 if (strcmp(princ, princ_unparsed)) {
65 krb5_errx(context, 1, "%s != %s", princ, princ_unparsed);
122 if (strcmp(princ, princ_unparsed))
123 krb5_errx(context, 1, "'%s' != '%s'", princ, princ_unparsed);
144 if (strcmp(princ, princ_unparsed) == 0)
145 krb5_errx(context, 1, "%s == %s", princ, princ_unparsed);
150 ret = krb5_parse_name(context, princ, &p2);
161 if (strcmp(princ, princ_unparsed)
    [all...]
parse-name-test.c 83 krb5_principal princ; local
88 ret = krb5_parse_name(context, t->input_string, &princ);
92 if (strcmp (t->realm, princ->realm) != 0) {
95 princ->realm, t->realm,
100 if (t->ncomponents != princ->name.name_string.len) {
103 princ->name.name_string.len, t->ncomponents,
109 princ->name.name_string.val[i]) != 0) {
113 princ->name.name_string.val[i],
121 ret = krb5_unparse_name_fixed(context, princ,
130 ret = krb5_unparse_name_fixed(context, princ,
    [all...]
test_alname.c 67 char *princ; local
73 ret = krb5_unparse_name(context, p, &princ);
81 free(princ);
85 princ, localuser);
86 free(princ);
141 krb5_principal princ; local
149 ret = krb5_parse_name(context, argv[0], &princ);
153 ret = krb5_unparse_name(context, princ, &unparsed);
162 ret = krb5_aname_to_localname(context, princ, lname_size, localname);
188 krb5_free_principal(context, princ);
    [all...]
test_canon.c 52 krb5_principal princ = NULL; local
102 retval = krb5_sname_to_principal(context, hostname, "host", KRB5_NT_SRV_HST, &princ);
106 retval = krb5_unparse_name(context, princ, &unparsed);
117 eq = krb5_principal_compare(context, princ, cmp_to_princ);
132 in_creds.server = princ;
150 retval = krb5_kt_get_entry(context, kt, princ, 0, 0, &ktent);
162 krb5_free_principal(context, princ);
  /src/crypto/external/bsd/openssh/dist/
gss-serv-krb5.c 85 krb5_principal princ; local
93 &princ))) {
99 if (krb5_kuserok(krb_context, princ, name)) {
106 krb5_free_principal(krb_context, princ);
119 krb5_principal princ; local
141 client->exportedname.value, &princ))) {
149 if ((problem = krb5_cc_initialize(krb_context, ccache, princ))) {
153 krb5_free_principal(krb_context, princ);
158 krb5_free_principal(krb_context, princ);
  /src/crypto/external/bsd/heimdal/dist/admin/
change.c 179 krb5_principal princ; local
181 ret = krb5_parse_name (context, argv[i], &princ);
186 if (krb5_principal_compare (context, princ, entry.principal))
189 krb5_free_principal (context, princ);
get.c 128 kadm5_principal_ent_rec princ; local
141 memset(&princ, 0, sizeof(princ));
142 princ.principal = princ_ent;
144 princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX;
146 princ.princ_expire_time = 0;
163 ret = kadm5_create_principal(kadm_handle, &princ, mask, "x");
180 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
190 if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX))
192 princ.attributes &= (~KRB5_KDB_DISALLOW_ALL_TIX)
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kuser/
kcpytkt.c 82 char *princ; local
128 ret = krb5_unparse_name(context, in_creds.server, &princ);
145 krb5_warn(context, ret, "Can't retrieve credentials for %s", princ);
147 krb5_free_unparsed_name(context, princ);
158 krb5_warn(context, ret, "Can't store credentials for %s", princ);
161 krb5_free_unparsed_name(context, princ);
167 krb5_free_unparsed_name(context, princ);
kdeltkt.c 81 char *princ; local
123 ret = krb5_unparse_name(context, in_creds.server, &princ);
140 krb5_warn(context, ret, "Can't retrieve credentials for %s", princ);
142 krb5_free_unparsed_name(context, princ);
153 krb5_warn(context, ret, "Can't remove credentials for %s", princ);
156 krb5_free_unparsed_name(context, princ);
162 krb5_free_unparsed_name(context, princ);
  /src/usr.bin/login/
k5login.c 127 krb5_principal princ; local
134 kerror = krb5_sname_to_principal(c, 0, 0, KRB5_NT_SRV_HST, &princ);
143 kerror = krb5_kt_read_service_key(c, NULL, princ, 0, 0, &kb);
186 princ, NULL, NULL, &ticket);
222 krb5_free_principal(c, princ);

Completed in 38 milliseconds

1 2