| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| free.c | 62 kadm5_principal_ent_t princ) 66 if (princ->principal) 67 krb5_free_principal(context->context, princ->principal); 68 if (princ->mod_name) 69 krb5_free_principal(context->context, princ->mod_name); 70 kadm5_free_key_data(server_handle, &princ->n_key_data, princ->key_data); 71 while (princ->n_tl_data && princ->tl_data) { 73 tp = princ->tl_data [all...] |
| marshall.c | 172 kadm5_principal_ent_t princ, 178 krb5_store_principal(sp, princ->principal); 180 krb5_store_int32(sp, princ->princ_expire_time); 182 krb5_store_int32(sp, princ->pw_expiration); 184 krb5_store_int32(sp, princ->last_pwd_change); 186 krb5_store_int32(sp, princ->max_life); 188 krb5_store_int32(sp, princ->mod_name != NULL); 189 if(princ->mod_name) 190 krb5_store_principal(sp, princ->mod_name); 193 krb5_store_int32(sp, princ->mod_date) [all...] |
| get_princs_s.c | 48 add_princ(struct foreach_data *d, char *princ) 55 d->princs[d->count++] = princ; 63 char *princ; local 65 ret = krb5_unparse_name(context, ent->entry.principal, &princ); 69 if(fnmatch(d->exp, princ, 0) == 0 || fnmatch(d->exp2, princ, 0) == 0) 70 ret = add_princ(d, princ); 72 free(princ); 74 ret = add_princ(d, princ); 77 free(princ); [all...] |
| common_glue.c | 45 krb5_principal princ, 48 return __CALL(chpass_principal, (server_handle, princ, 0, 54 krb5_principal princ, 60 return __CALL(chpass_principal, (server_handle, princ, keepold, 66 krb5_principal princ, 71 (server_handle, princ, 0, n_key_data, key_data)); 76 krb5_principal princ, 82 (server_handle, princ, keepold, n_key_data, key_data)); 87 kadm5_principal_ent_t princ, 94 (server_handle, princ, mask, n_ks_tuple, ks_tuple, password)) [all...] |
| modify_s.c | 42 kadm5_principal_ent_t princ, 54 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default")) 68 princ->principal, HDB_F_GET_ANY|HDB_F_ADMIN_DATA, 0, &ent); 71 ret = _kadm5_setup_entry(context, &ent, mask, princ, mask, NULL, 0); 83 * the bogus keys in princ->key_data[] have corresponding bogus keys in ent 87 kadm5_some_keys_are_bogus(princ->n_key_data, princ->key_data)) { 103 ext.data.u.policy = strdup(princ->policy); 136 kadm5_principal_ent_t princ, 139 return modify_principal(server_handle, princ, mask [all...] |
| ent_setup.c | 131 * Create the hdb entry `ent' based on data from `princ' with 140 kadm5_principal_ent_t princ, 147 if (princ->princ_expire_time) 148 set_value(ent->entry.valid_end, princ->princ_expire_time); 154 if (princ->pw_expiration) 155 set_value(ent->entry.pw_end, princ->pw_expiration); 161 attr_to_flags(princ->attributes, &ent->entry.flags); 172 if(princ->max_life) 173 set_value(ent->entry.max_life, princ->max_life); 187 ret = hdb_change_kvno(context->context, princ->kvno, &ent->entry) [all...] |
| acl.c | 75 * retrieve the right for the current caller on `princ' (NULL means all) 82 krb5_const_principal princ, 126 if (princ != NULL) { 134 princ, pattern_princ); 154 krb5_principal princ; local 157 ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ); 160 ret = krb5_principal_compare(context->context, context->caller, princ); 161 krb5_free_principal(context->context, princ); 202 * `op' on `princ' and otherwise an error 203 * princ == NULL if it's not relevant [all...] |
| create_s.c | 41 get_default(kadm5_server_context *context, krb5_principal princ, 46 krb5_const_realm realm = krb5_principal_get_realm(context->context, princ); 60 kadm5_principal_ent_t princ, 75 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default")) 78 ret = krb5_copy_principal(context->context, princ->principal, 84 ret = get_default(context, princ->principal, defent); 94 princ, mask, 109 kadm5_principal_ent_t princ, 118 princ->kvno = 1; 122 ret = create_principal(context, princ, mask, &ent [all...] |
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| del_enctype.c | 46 kadm5_principal_ent_rec princ; local 56 memset (&princ, 0, sizeof(princ)); 79 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 87 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) { 92 new_key_data = malloc(princ.n_key_data * sizeof(*new_key_data)); 93 if (new_key_data == NULL && princ.n_key_data != 0) { 98 for (i = 0, j = 0; i < princ.n_key_data; ++i) { 100 key = &princ.key_data[i] [all...] |
| init.c | 45 create_random_entry(krb5_principal princ, 63 ret = krb5_unparse_name(context, princ, &name); 70 ent.principal = princ; 94 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys); 103 ret = kadm5_get_principal(kadm_handle, princ, &ent, 168 krb5_principal princ; local 186 ret = krb5_make_principal(context, &princ, realm, 191 create_random_entry(princ, max_life, max_rlife, 0, 0); 192 krb5_free_principal(context, princ); 198 krb5_make_principal(context, &princ, realm [all...] |
| add_enctype.c | 46 kadm5_principal_ent_rec princ; local 60 memset(&princ, 0, sizeof(princ)); 84 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 93 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) { 98 new_key_data = calloc(princ.n_key_data + n_etypes, 105 for (i = 0; i < princ.n_key_data; ++i) { 106 krb5_key_data *key = &princ.key_data[i]; 121 int n = princ.n_key_data + i [all...] |
| ank.c | 40 * fetch the default principal corresponding to `princ' 45 krb5_principal princ, 50 krb5_const_realm realm = krb5_principal_get_realm(contextp->context, princ); 82 kadm5_principal_ent_rec princ, defrec; local 89 memset(&princ, 0, sizeof(princ)); 95 princ.principal = princ_ent; 98 ret = set_entry(context, &princ, &mask, 115 set_defaults(&princ, &mask, default_ent, default_mask); 117 if(edit_entry(&princ, &mask, default_ent, default_mask) [all...] |
| ext.c | 48 kadm5_principal_ent_rec princ; local 61 ret = kadm5_get_principal(kadm_handle, principal, &princ, mask); 70 if (princ.n_key_data == 0) { 84 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) { 89 if (kadm5_some_keys_are_bogus(princ.n_key_data, princ.key_data)) { 93 keys = calloc(sizeof(*keys), princ.n_key_data); 98 for (i = 0; i < princ.n_key_data; i++) { 99 krb5_key_data *kd = &princ.key_data[i] [all...] |
| mod.c | 40 add_tl(kadm5_principal_ent_rec *princ, int type, krb5_data *data) 50 princ->n_tl_data++; 51 ptl = &princ->tl_data; 61 kadm5_principal_ent_rec *princ, 104 add_tl(princ, KRB5_TL_EXTENSION, &buf); 108 add_aliases(krb5_context contextp, kadm5_principal_ent_rec *princ, 154 add_tl(princ, KRB5_TL_EXTENSION, &buf); 158 add_pkinit_acl(krb5_context contextp, kadm5_principal_ent_rec *princ, 194 add_tl(princ, KRB5_TL_EXTENSION, &buf); 198 add_kvno_diff(krb5_context contextp, kadm5_principal_ent_rec *princ, 232 kadm5_principal_ent_rec princ; local [all...] |
| check.c | 69 kadm5_principal_ent_rec princ; local 77 memset (&princ, 0, sizeof(princ)); 78 ret = kadm5_get_principal(kadm_handle, principal, &princ, 86 for (i = 0; i < princ.n_key_data; i++) { 89 princ.key_data[i].key_data_type[0], 91 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { 94 name, princ.key_data[i].key_data_type[0], 95 (unsigned long)princ.key_data[i].key_data_length); 100 kadm5_free_principal_ent(kadm_handle, &princ); [all...] |
| server.c | 52 krb5_principal princ, princ2; local 77 ret = krb5_ret_principal(sp, &princ); 82 krb5_free_principal(contextp->context, princ); 86 krb5_unparse_name_fixed(contextp->context, princ, name, sizeof(name)); 90 ret = _kadm5_acl_check_permission(contextp, KADM5_PRIV_GET, princ); 92 krb5_free_principal(contextp->context, princ); 99 princ); 122 krb5_free_principal(contextp->context, princ); 127 ret = kadm5_get_principal(kadm_handlep, princ, &ent, mask); 138 krb5_free_principal(contextp->context, princ); [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| get_default_principal.c | 63 krb5_principal *princ) 69 *princ = NULL; 77 ret = krb5_make_principal(context, princ, NULL, user, "root", NULL); 79 ret = krb5_make_principal(context, princ, NULL, "root", NULL); 97 ret = krb5_make_principal(context, princ, NULL, user, NULL); 109 krb5_principal *princ) 120 princ); 131 return krb5_make_principal(context, princ, NULL, username, NULL); 145 return krb5_make_principal(context, princ, NULL, username, NULL); 153 krb5_principal *princ) [all...] |
| parse-name-test.c | 83 krb5_principal princ; local 88 ret = krb5_parse_name(context, t->input_string, &princ); 92 if (strcmp (t->realm, princ->realm) != 0) { 95 princ->realm, t->realm, 100 if (t->ncomponents != princ->name.name_string.len) { 103 princ->name.name_string.len, t->ncomponents, 109 princ->name.name_string.val[i]) != 0) { 113 princ->name.name_string.val[i], 121 ret = krb5_unparse_name_fixed(context, princ, 130 ret = krb5_unparse_name_fixed(context, princ, [all...] |
| test_princ.c | 46 const char *princ = "lha@SU.SE"; local 56 ret = krb5_parse_name(context, princ, &p); 64 if (strcmp(princ, princ_unparsed)) { 65 krb5_errx(context, 1, "%s != %s", princ, princ_unparsed); 122 if (strcmp(princ, princ_unparsed)) 123 krb5_errx(context, 1, "'%s' != '%s'", princ, princ_unparsed); 144 if (strcmp(princ, princ_unparsed) == 0) 145 krb5_errx(context, 1, "%s == %s", princ, princ_unparsed); 150 ret = krb5_parse_name(context, princ, &p2); 161 if (strcmp(princ, princ_unparsed) [all...] |
| test_alname.c | 67 char *princ; local 73 ret = krb5_unparse_name(context, p, &princ); 81 free(princ); 85 princ, localuser); 86 free(princ); 141 krb5_principal princ; local 149 ret = krb5_parse_name(context, argv[0], &princ); 153 ret = krb5_unparse_name(context, princ, &unparsed); 162 ret = krb5_aname_to_localname(context, princ, lname_size, localname); 188 krb5_free_principal(context, princ); [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| gss-serv-krb5.c | 85 krb5_principal princ; local 93 &princ))) { 99 if (krb5_kuserok(krb_context, princ, name)) { 106 krb5_free_principal(krb_context, princ); 119 krb5_principal princ; local 141 client->exportedname.value, &princ))) { 149 if ((problem = krb5_cc_initialize(krb_context, ccache, princ))) { 153 krb5_free_principal(krb_context, princ); 158 krb5_free_principal(krb_context, princ);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
| authorize_localname.c | 44 krb5_principal princ = (krb5_principal)input_name; local 63 user_ok = krb5_kuserok(context, princ, user);
|
| /src/external/gpl2/gettext/dist/gettext-tools/tests/ |
| xgettext-elisp-1 | 11 (princ (_ "help")) 13 (princ (_ "me")) 15 (princ (_ "Hey Jude")) 18 (princ (_ "The Fabulous Four"))
|
| xgettext-librep-1 | 11 (princ (_ "help")) 13 (princ (_ "me")) 15 (princ (_ "Hey Jude")) 19 (princ (_ "The Fabulous Four"))
|
| /src/crypto/external/bsd/heimdal/dist/admin/ |
| get.c | 128 kadm5_principal_ent_rec princ; local 141 memset(&princ, 0, sizeof(princ)); 142 princ.principal = princ_ent; 144 princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX; 146 princ.princ_expire_time = 0; 163 ret = kadm5_create_principal(kadm_handle, &princ, mask, "x"); 180 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 190 if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX)) 192 princ.attributes &= (~KRB5_KDB_DISALLOW_ALL_TIX) [all...] |