| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| pw_quality.c | 43 krb5_principal principal; local 47 ret = krb5_parse_name(context, argv[0], &principal); 55 s = kadm5_check_password_quality (context, principal, &pw_data); 59 krb5_free_principal(context, principal);
|
| check.c | 47 krb5_principal principal; local 49 ret = krb5_parse_name(context, name, &principal); 56 ret = kadm5_get_principal(kadm_handle, principal, ent, KADM5_ATTRIBUTES); 57 krb5_free_principal(context, principal); 66 do_check_entry(krb5_principal principal, void *data) 73 ret = krb5_unparse_name(context, principal, &name); 78 ret = kadm5_get_principal(kadm_handle, principal, &princ, 81 krb5_warn(context, ret, "Failed to get principal: %s", name); 93 "Principal %s enctype %d, wrong length: %lu\n", 192 * Check that disallow-all-tix is set on the default principal [all...] |
| /src/crypto/external/bsd/heimdal/dist/admin/ |
| remove.c | 46 krb5_principal principal = NULL; local 50 ret = krb5_parse_name(context, opt->principal_string, &principal); 64 if(principal) 65 krb5_free_principal(context, principal); 70 if (!principal && !enctype && !opt->kvno_integer) { 73 "principal, enctype or kvno."); 83 entry.principal = principal; 91 if(principal) 92 krb5_free_principal(context, principal); [all...] |
| purge.c | 41 * keep track of the highest version for every principal. 45 krb5_principal principal; member in struct:e 57 if (krb5_principal_compare (context, princ, e->principal)) 79 ret = krb5_copy_principal (context, princ, &e->principal); 93 krb5_free_principal (context, head->principal); 131 add_entry (entry.principal, entry.vno, entry.timestamp, &head); 145 struct e *e = get_entry (entry.principal, head); 157 krb5_unparse_name (context, entry.principal, &name_str);
|
| change.c | 42 krb5_principal principal, krb5_kvno kvno, 53 ret = krb5_unparse_name (context, principal, &client_name); 62 realm = krb5_principal_get_realm(context, principal); 101 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); 112 new_entry.principal = principal; 131 krb5_principal principal; member in struct:change_set 163 if (krb5_principal_compare (context, changeset[i].principal, 164 entry.principal)) { 186 if (krb5_principal_compare (context, princ, entry.principal)) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| default_keys.c | 84 parse_file(krb5_context context, krb5_principal principal, int no_salt) 90 ret = hdb_generate_key_set(context, principal, NULL, 0, &keys, &nkeys, 105 krb5_principal principal; local 111 ret = krb5_parse_name(context, "lha@SU.SE", &principal); 115 parse_file(context, principal, 0); 116 parse_file(context, principal, 1); 118 krb5_free_principal(context, principal);
|
| test_pw_quality.c | 47 static char *principal; variable 51 { "principal", 0, arg_string, &principal, NULL, NULL }, 76 if (principal == NULL) 77 krb5_errx(context, 1, "no principal given"); 81 ret = krb5_parse_name(context, principal, &p); 83 krb5_errx(context, 1, "krb5_parse_name: %s", principal);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| test_kuserok.c | 55 "principal luser"); 64 krb5_principal principal; local 91 ret = krb5_parse_name(context, argv[0], &principal); 95 ret = krb5_unparse_name(context, principal, &p); 99 ret = krb5_kuserok(context, principal, argv[1]); 101 krb5_free_principal(context, principal);
|
| store-test.c | 75 krb5_principal principal; local 108 krb5_make_principal(context, &principal, "TEST", "foobar", NULL); 109 krb5_store_principal(sp, principal); 110 krb5_free_principal(context, principal); 111 nerr += compare("Principal", sp, "\x0\x0\x0\x1"
|
| string-to-key-test.c | 106 /* to enable realm-less principal name above */ 112 krb5_principal principal; local 115 ret = krb5_parse_name (context, t->principal_name, &principal); 120 principal, &key); 123 krb5_free_principal (context, principal);
|
| test_ap-req.c | 53 "let server pick the principal", NULL }, 170 const char *principal, *keytab, *ccache; local 194 principal = argv[0]; 206 ret = krb5_parse_name(context, principal, &sprincipal);
|
| deprecated.c | 317 krb5_principal principal = args->principal; variable 327 ret = krb5_kt_get_entry (context, real_keytab, principal, 359 a.principal = creds->client; 404 krb5_principal principal) 407 return &principal->realm; 419 krb5_principal principal, 423 principal->realm = *realm;
|
| /src/lib/libpam/modules/pam_afslog/ |
| pam_afslog.c | 57 krb5_principal principal; local 81 kret = krb5_cc_get_principal(ctx, ccache, &principal); 89 ctx, principal), 114 krb5_free_principal(ctx, principal);
|
| /src/sys/fs/nfs/client/ |
| nfs_clkrpc.c | 210 * sure that getting Acceptor credentials for a user principal with a 221 char principal[128]; local 225 error = copyinstr(args->principal, principal, 226 sizeof(principal), NULL); 230 principal[0] = '\0'; 246 if (principal[0] != '\0') 247 rpc_gss_set_svc_name_call(principal, "kerberosv5",
|
| /src/crypto/external/bsd/heimdal/dist/kuser/ |
| kverify.c | 52 "[principal]"); 65 krb5_principal principal = NULL; local 99 ret = krb5_parse_name(context, argv[0], &principal); 103 ret = krb5_get_default_principal(context, &principal); 111 principal,
|
| /src/crypto/external/bsd/heimdal/dist/lib/hdb/ |
| test_hdbkeys.c | 55 krb5_principal principal; local 86 ret = krb5_parse_name (context, principal_str, &principal); 98 ret = hdb_generate_key_set_password(context, principal, password_str, 107 krb5_free_principal (context, principal);
|
| /src/usr.bin/passwd/ |
| krb5_passwd.c | 65 (void) fprintf(stderr, "%s %s [-d krb5 | -k] [principal]\n", 73 (void) fprintf(stderr, "%s %s [principal]\n", 83 krb5_principal principal; local 108 * Historical option to specify principal. 127 /* overrides -u <principal> */ 152 ret = krb5_parse_name(context, username, &principal); 155 pwkrb5_warn("failed to parse principal", context, ret); 161 principal, 278 krb5_principal principal; local 302 ret = krb5_parse_name (context, username, &principal); [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| string2key.c | 42 char *principal; variable 57 { "principal",'p', arg_string, &principal, "Kerberos v5 principal to use", "principal" }, 145 if(version5 && principal == NULL){ 146 printf("Kerberos v5 principal: "); 150 principal = estrdup(buf); 168 ret = krb5_parse_name(context, principal, &princ); 170 krb5_err(context, 1, ret, "failed to unparse name: %s", principal); [all...] |
| /src/crypto/external/bsd/heimdal/dist/kpasswd/ |
| kpasswd.c | 45 { "admin-principal", 0, arg_string, &admin_principal_str, NULL, 55 arg_printusage (a, num_args, NULL, "[principal ...]"); 61 krb5_principal principal, 75 if (principal == NULL) 78 ret = krb5_unparse_name(context, principal, &name); 98 principal, 124 krb5_principal principal; local 227 ret = krb5_parse_name (context, argv[0], &principal); 231 ret = change_password(context, principal, id); 234 krb5_free_principal(context, principal); [all...] |
| kpasswd-generator.c | 97 krb5_principal principal; local 108 ret = krb5_parse_name(context, name, &principal); 121 principal, 138 principal, 149 krb5_free_principal(context, principal);
|
| /src/sys/fs/nfs/server/ |
| nfs_nfsdkrpc.c | 479 char principal[MAXHOSTNAMELEN + 5]; local 484 error = copyinstr(args->principal, principal, sizeof (principal), 507 if (principal[0] != '\0') { 508 ret2 = rpc_gss_set_svc_name_call(principal, 510 ret3 = rpc_gss_set_svc_name_call(principal, 512 ret4 = rpc_gss_set_svc_name_call(principal, 524 if (principal[0] != '\0') {
|
| /src/usr.bin/login/ |
| k5login.c | 150 * principal, instead of a service/hostname. (Did I miss one?) */ 337 char *principal; local 372 asprintf(&principal, "%s/%s", pw->pw_name, instance); 374 principal = strdup(pw->pw_name); 375 if (!principal) { 385 if ((kerror = krb5_parse_name(kcontext, principal, &me)) != 0) { 386 k5_log(kcontext, kerror, "when parsing name %s", principal); 391 k5_log(kcontext, kerror, "when unparsing name %s", principal); 424 printf("%s: Kerberos Password incorrect\n", principal);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| kdc.c | 66 krb5_principal principal = NULL; local 85 KRB5_NT_SRV_HST, &principal); 89 ret = krb5_cc_cache_match(context, principal, id); 114 principal, 149 if (principal) 150 krb5_free_principal(context, principal);
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/kinit/ |
| kinit.c | 40 static char* principal; variable 71 "Principal in ccache does not match requested principal\n"); 215 if (!principal) { 217 principal=ch_calloc(len, 1); 218 snprintf(principal, len, "ldap/%s", global_host_bv.bv_val); 219 Log(LDAP_DEBUG_TRACE, LDAP_LEVEL_DEBUG, "Principal <%s>\n", principal ); 222 rc = krb5_parse_name(kid->ctx, principal, &kid->princ); 252 principal = ch_strdup(argv[0]) [all...] |
| /src/lib/libtelnet/ |
| kerberos5.c | 678 krb5_principal principal; local 687 ret = krb5_cc_get_principal(telnet_context, ccache, &principal); 690 printf("KerberosV5: could not get principal: %s\r\n", 696 creds.client = principal; 699 strlen(principal->realm), principal->realm, "krbtgt", 700 principal->realm, NULL); 704 printf("KerberosV5: could not get principal: %s\r\n",
|