/src/lib/libpam/modules/pam_afslog/ |
pam_afslog.c | 57 krb5_principal principal; local in function:pam_sm_setcred 81 kret = krb5_cc_get_principal(ctx, ccache, &principal); 89 ctx, principal), 114 krb5_free_principal(ctx, principal);
|
/src/sys/fs/nfs/client/ |
nfs_clkrpc.c | 210 * sure that getting Acceptor credentials for a user principal with a 221 char principal[128]; local in function:nfscbd_nfsd 225 error = copyinstr(args->principal, principal, 226 sizeof(principal), NULL); 230 principal[0] = '\0'; 246 if (principal[0] != '\0') 247 rpc_gss_set_svc_name_call(principal, "kerberosv5",
|
/src/usr.bin/passwd/ |
krb5_passwd.c | 65 (void) fprintf(stderr, "%s %s [-d krb5 | -k] [principal]\n", 73 (void) fprintf(stderr, "%s %s [principal]\n", 83 krb5_principal principal; local in function:pwkrb5_process 108 * Historical option to specify principal. 127 /* overrides -u <principal> */ 152 ret = krb5_parse_name(context, username, &principal); 155 pwkrb5_warn("failed to parse principal", context, ret); 161 principal, 278 krb5_principal principal; local in function:krb5_chpw 302 ret = krb5_parse_name (context, username, &principal); [all...] |
/src/usr.bin/login/ |
k5login.c | 150 * principal, instead of a service/hostname. (Did I miss one?) */ 337 char *principal; local in function:k5login 372 asprintf(&principal, "%s/%s", pw->pw_name, instance); 374 principal = strdup(pw->pw_name); 375 if (!principal) { 385 if ((kerror = krb5_parse_name(kcontext, principal, &me)) != 0) { 386 k5_log(kcontext, kerror, "when parsing name %s", principal); 391 k5_log(kcontext, kerror, "when unparsing name %s", principal); 424 printf("%s: Kerberos Password incorrect\n", principal);
|
/src/sys/fs/nfs/server/ |
nfs_nfsdkrpc.c | 479 char principal[MAXHOSTNAMELEN + 5]; local in function:nfsrvd_nfsd 484 error = copyinstr(args->principal, principal, sizeof (principal), 507 if (principal[0] != '\0') { 508 ret2 = rpc_gss_set_svc_name_call(principal, 510 ret3 = rpc_gss_set_svc_name_call(principal, 512 ret4 = rpc_gss_set_svc_name_call(principal, 524 if (principal[0] != '\0') {
|
/src/lib/libtelnet/ |
kerberos5.c | 678 krb5_principal principal; local in function:kerberos5_forward 687 ret = krb5_cc_get_principal(telnet_context, ccache, &principal); 690 printf("KerberosV5: could not get principal: %s\r\n", 696 creds.client = principal; 699 strlen(principal->realm), principal->realm, "krbtgt", 700 principal->realm, NULL); 704 printf("KerberosV5: could not get principal: %s\r\n",
|
/src/lib/libpam/modules/pam_krb5/ |
pam_krb5.c | 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local in function:pam_sm_authenticate 233 /* Get principal name */ 235 asprintf(&principal, "%s/%s", (const char *)sourceuser, user); 237 principal = strdup(user); 239 PAM_LOG("Created principal: %s", principal); 241 krbret = krb5_parse_name(pam_context, principal, &princ); 242 free(principal); 252 /* Now convert the principal name into something human readable */ 261 PAM_LOG("Got principal: %s", princ_name) [all...] |
/src/sys/fs/nfs/common/ |
nfs.h | 178 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfsd_args 187 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfscbd_args 602 int nd_gssnamelen; /* principal name length */ 603 char *nd_gssname; /* principal name */
|