HomeSort by: relevance | last modified time | path
    Searched defs:principal (Results 1 - 8 of 8) sorted by relevancy

  /src/lib/libpam/modules/pam_afslog/
pam_afslog.c 57 krb5_principal principal; local in function:pam_sm_setcred
81 kret = krb5_cc_get_principal(ctx, ccache, &principal);
89 ctx, principal),
114 krb5_free_principal(ctx, principal);
  /src/sys/fs/nfs/client/
nfs_clkrpc.c 210 * sure that getting Acceptor credentials for a user principal with a
221 char principal[128]; local in function:nfscbd_nfsd
225 error = copyinstr(args->principal, principal,
226 sizeof(principal), NULL);
230 principal[0] = '\0';
246 if (principal[0] != '\0')
247 rpc_gss_set_svc_name_call(principal, "kerberosv5",
  /src/usr.bin/passwd/
krb5_passwd.c 65 (void) fprintf(stderr, "%s %s [-d krb5 | -k] [principal]\n",
73 (void) fprintf(stderr, "%s %s [principal]\n",
83 krb5_principal principal; local in function:pwkrb5_process
108 * Historical option to specify principal.
127 /* overrides -u <principal> */
152 ret = krb5_parse_name(context, username, &principal);
155 pwkrb5_warn("failed to parse principal", context, ret);
161 principal,
278 krb5_principal principal; local in function:krb5_chpw
302 ret = krb5_parse_name (context, username, &principal);
    [all...]
  /src/usr.bin/login/
k5login.c 150 * principal, instead of a service/hostname. (Did I miss one?) */
337 char *principal; local in function:k5login
372 asprintf(&principal, "%s/%s", pw->pw_name, instance);
374 principal = strdup(pw->pw_name);
375 if (!principal) {
385 if ((kerror = krb5_parse_name(kcontext, principal, &me)) != 0) {
386 k5_log(kcontext, kerror, "when parsing name %s", principal);
391 k5_log(kcontext, kerror, "when unparsing name %s", principal);
424 printf("%s: Kerberos Password incorrect\n", principal);
  /src/sys/fs/nfs/server/
nfs_nfsdkrpc.c 479 char principal[MAXHOSTNAMELEN + 5]; local in function:nfsrvd_nfsd
484 error = copyinstr(args->principal, principal, sizeof (principal),
507 if (principal[0] != '\0') {
508 ret2 = rpc_gss_set_svc_name_call(principal,
510 ret3 = rpc_gss_set_svc_name_call(principal,
512 ret4 = rpc_gss_set_svc_name_call(principal,
524 if (principal[0] != '\0') {
  /src/lib/libtelnet/
kerberos5.c 678 krb5_principal principal; local in function:kerberos5_forward
687 ret = krb5_cc_get_principal(telnet_context, ccache, &principal);
690 printf("KerberosV5: could not get principal: %s\r\n",
696 creds.client = principal;
699 strlen(principal->realm), principal->realm, "krbtgt",
700 principal->realm, NULL);
704 printf("KerberosV5: could not get principal: %s\r\n",
  /src/lib/libpam/modules/pam_krb5/
pam_krb5.c 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local in function:pam_sm_authenticate
233 /* Get principal name */
235 asprintf(&principal, "%s/%s", (const char *)sourceuser, user);
237 principal = strdup(user);
239 PAM_LOG("Created principal: %s", principal);
241 krbret = krb5_parse_name(pam_context, principal, &princ);
242 free(principal);
252 /* Now convert the principal name into something human readable */
261 PAM_LOG("Got principal: %s", princ_name)
    [all...]
  /src/sys/fs/nfs/common/
nfs.h 178 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfsd_args
187 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfscbd_args
602 int nd_gssnamelen; /* principal name length */
603 char *nd_gssname; /* principal name */

Completed in 15 milliseconds