HomeSort by: relevance | last modified time | path
    Searched refs:princ (Results 1 - 25 of 74) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
free.c 62 kadm5_principal_ent_t princ)
66 if (princ->principal)
67 krb5_free_principal(context->context, princ->principal);
68 if (princ->mod_name)
69 krb5_free_principal(context->context, princ->mod_name);
70 kadm5_free_key_data(server_handle, &princ->n_key_data, princ->key_data);
71 while (princ->n_tl_data && princ->tl_data) {
73 tp = princ->tl_data
    [all...]
marshall.c 172 kadm5_principal_ent_t princ,
178 krb5_store_principal(sp, princ->principal);
180 krb5_store_int32(sp, princ->princ_expire_time);
182 krb5_store_int32(sp, princ->pw_expiration);
184 krb5_store_int32(sp, princ->last_pwd_change);
186 krb5_store_int32(sp, princ->max_life);
188 krb5_store_int32(sp, princ->mod_name != NULL);
189 if(princ->mod_name)
190 krb5_store_principal(sp, princ->mod_name);
193 krb5_store_int32(sp, princ->mod_date)
    [all...]
get_princs_s.c 48 add_princ(struct foreach_data *d, char *princ)
55 d->princs[d->count++] = princ;
63 char *princ; local
65 ret = krb5_unparse_name(context, ent->entry.principal, &princ);
69 if(fnmatch(d->exp, princ, 0) == 0 || fnmatch(d->exp2, princ, 0) == 0)
70 ret = add_princ(d, princ);
72 free(princ);
74 ret = add_princ(d, princ);
77 free(princ);
    [all...]
common_glue.c 45 krb5_principal princ,
48 return __CALL(chpass_principal, (server_handle, princ, 0,
54 krb5_principal princ,
60 return __CALL(chpass_principal, (server_handle, princ, keepold,
66 krb5_principal princ,
71 (server_handle, princ, 0, n_key_data, key_data));
76 krb5_principal princ,
82 (server_handle, princ, keepold, n_key_data, key_data));
87 kadm5_principal_ent_t princ,
94 (server_handle, princ, mask, n_ks_tuple, ks_tuple, password))
    [all...]
modify_s.c 42 kadm5_principal_ent_t princ,
54 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default"))
68 princ->principal, HDB_F_GET_ANY|HDB_F_ADMIN_DATA, 0, &ent);
71 ret = _kadm5_setup_entry(context, &ent, mask, princ, mask, NULL, 0);
83 * the bogus keys in princ->key_data[] have corresponding bogus keys in ent
87 kadm5_some_keys_are_bogus(princ->n_key_data, princ->key_data)) {
103 ext.data.u.policy = strdup(princ->policy);
136 kadm5_principal_ent_t princ,
139 return modify_principal(server_handle, princ, mask
    [all...]
ent_setup.c 131 * Create the hdb entry `ent' based on data from `princ' with
140 kadm5_principal_ent_t princ,
147 if (princ->princ_expire_time)
148 set_value(ent->entry.valid_end, princ->princ_expire_time);
154 if (princ->pw_expiration)
155 set_value(ent->entry.pw_end, princ->pw_expiration);
161 attr_to_flags(princ->attributes, &ent->entry.flags);
172 if(princ->max_life)
173 set_value(ent->entry.max_life, princ->max_life);
187 ret = hdb_change_kvno(context->context, princ->kvno, &ent->entry)
    [all...]
acl.c 75 * retrieve the right for the current caller on `princ' (NULL means all)
82 krb5_const_principal princ,
126 if (princ != NULL) {
134 princ, pattern_princ);
154 krb5_principal princ; local
157 ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
160 ret = krb5_principal_compare(context->context, context->caller, princ);
161 krb5_free_principal(context->context, princ);
202 * `op' on `princ' and otherwise an error
203 * princ == NULL if it's not relevant
    [all...]
create_s.c 41 get_default(kadm5_server_context *context, krb5_principal princ,
46 krb5_const_realm realm = krb5_principal_get_realm(context->context, princ);
60 kadm5_principal_ent_t princ,
75 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default"))
78 ret = krb5_copy_principal(context->context, princ->principal,
84 ret = get_default(context, princ->principal, defent);
94 princ, mask,
109 kadm5_principal_ent_t princ,
118 princ->kvno = 1;
122 ret = create_principal(context, princ, mask, &ent
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kadmin/
del_enctype.c 46 kadm5_principal_ent_rec princ; local
56 memset (&princ, 0, sizeof(princ));
79 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
87 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) {
92 new_key_data = malloc(princ.n_key_data * sizeof(*new_key_data));
93 if (new_key_data == NULL && princ.n_key_data != 0) {
98 for (i = 0, j = 0; i < princ.n_key_data; ++i) {
100 key = &princ.key_data[i]
    [all...]
init.c 45 create_random_entry(krb5_principal princ,
63 ret = krb5_unparse_name(context, princ, &name);
70 ent.principal = princ;
94 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys);
103 ret = kadm5_get_principal(kadm_handle, princ, &ent,
168 krb5_principal princ; local
186 ret = krb5_make_principal(context, &princ, realm,
191 create_random_entry(princ, max_life, max_rlife, 0, 0);
192 krb5_free_principal(context, princ);
198 krb5_make_principal(context, &princ, realm
    [all...]
add_enctype.c 46 kadm5_principal_ent_rec princ; local
60 memset(&princ, 0, sizeof(princ));
84 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
93 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) {
98 new_key_data = calloc(princ.n_key_data + n_etypes,
105 for (i = 0; i < princ.n_key_data; ++i) {
106 krb5_key_data *key = &princ.key_data[i];
121 int n = princ.n_key_data + i
    [all...]
ank.c 40 * fetch the default principal corresponding to `princ'
45 krb5_principal princ,
50 krb5_const_realm realm = krb5_principal_get_realm(contextp->context, princ);
82 kadm5_principal_ent_rec princ, defrec; local
89 memset(&princ, 0, sizeof(princ));
95 princ.principal = princ_ent;
98 ret = set_entry(context, &princ, &mask,
115 set_defaults(&princ, &mask, default_ent, default_mask);
117 if(edit_entry(&princ, &mask, default_ent, default_mask)
    [all...]
ext.c 48 kadm5_principal_ent_rec princ; local
61 ret = kadm5_get_principal(kadm_handle, principal, &princ, mask);
70 if (princ.n_key_data == 0) {
84 if (kadm5_all_keys_are_bogus(princ.n_key_data, princ.key_data)) {
89 if (kadm5_some_keys_are_bogus(princ.n_key_data, princ.key_data)) {
93 keys = calloc(sizeof(*keys), princ.n_key_data);
98 for (i = 0; i < princ.n_key_data; i++) {
99 krb5_key_data *kd = &princ.key_data[i]
    [all...]
mod.c 40 add_tl(kadm5_principal_ent_rec *princ, int type, krb5_data *data)
50 princ->n_tl_data++;
51 ptl = &princ->tl_data;
61 kadm5_principal_ent_rec *princ,
104 add_tl(princ, KRB5_TL_EXTENSION, &buf);
108 add_aliases(krb5_context contextp, kadm5_principal_ent_rec *princ,
154 add_tl(princ, KRB5_TL_EXTENSION, &buf);
158 add_pkinit_acl(krb5_context contextp, kadm5_principal_ent_rec *princ,
194 add_tl(princ, KRB5_TL_EXTENSION, &buf);
198 add_kvno_diff(krb5_context contextp, kadm5_principal_ent_rec *princ,
232 kadm5_principal_ent_rec princ; local
    [all...]
check.c 69 kadm5_principal_ent_rec princ; local
77 memset (&princ, 0, sizeof(princ));
78 ret = kadm5_get_principal(kadm_handle, principal, &princ,
86 for (i = 0; i < princ.n_key_data; i++) {
89 princ.key_data[i].key_data_type[0],
91 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
94 name, princ.key_data[i].key_data_type[0],
95 (unsigned long)princ.key_data[i].key_data_length);
100 kadm5_free_principal_ent(kadm_handle, &princ);
    [all...]
server.c 52 krb5_principal princ, princ2; local
77 ret = krb5_ret_principal(sp, &princ);
82 krb5_free_principal(contextp->context, princ);
86 krb5_unparse_name_fixed(contextp->context, princ, name, sizeof(name));
90 ret = _kadm5_acl_check_permission(contextp, KADM5_PRIV_GET, princ);
92 krb5_free_principal(contextp->context, princ);
99 princ);
122 krb5_free_principal(contextp->context, princ);
127 ret = kadm5_get_principal(kadm_handlep, princ, &ent, mask);
138 krb5_free_principal(contextp->context, princ);
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
get_default_principal.c 63 krb5_principal *princ)
69 *princ = NULL;
77 ret = krb5_make_principal(context, princ, NULL, user, "root", NULL);
79 ret = krb5_make_principal(context, princ, NULL, "root", NULL);
97 ret = krb5_make_principal(context, princ, NULL, user, NULL);
109 krb5_principal *princ)
120 princ);
131 return krb5_make_principal(context, princ, NULL, username, NULL);
145 return krb5_make_principal(context, princ, NULL, username, NULL);
153 krb5_principal *princ)
    [all...]
parse-name-test.c 83 krb5_principal princ; local
88 ret = krb5_parse_name(context, t->input_string, &princ);
92 if (strcmp (t->realm, princ->realm) != 0) {
95 princ->realm, t->realm,
100 if (t->ncomponents != princ->name.name_string.len) {
103 princ->name.name_string.len, t->ncomponents,
109 princ->name.name_string.val[i]) != 0) {
113 princ->name.name_string.val[i],
121 ret = krb5_unparse_name_fixed(context, princ,
130 ret = krb5_unparse_name_fixed(context, princ,
    [all...]
test_princ.c 46 const char *princ = "lha@SU.SE"; local
56 ret = krb5_parse_name(context, princ, &p);
64 if (strcmp(princ, princ_unparsed)) {
65 krb5_errx(context, 1, "%s != %s", princ, princ_unparsed);
122 if (strcmp(princ, princ_unparsed))
123 krb5_errx(context, 1, "'%s' != '%s'", princ, princ_unparsed);
144 if (strcmp(princ, princ_unparsed) == 0)
145 krb5_errx(context, 1, "%s == %s", princ, princ_unparsed);
150 ret = krb5_parse_name(context, princ, &p2);
161 if (strcmp(princ, princ_unparsed)
    [all...]
test_alname.c 67 char *princ; local
73 ret = krb5_unparse_name(context, p, &princ);
81 free(princ);
85 princ, localuser);
86 free(princ);
141 krb5_principal princ; local
149 ret = krb5_parse_name(context, argv[0], &princ);
153 ret = krb5_unparse_name(context, princ, &unparsed);
162 ret = krb5_aname_to_localname(context, princ, lname_size, localname);
188 krb5_free_principal(context, princ);
    [all...]
  /src/crypto/external/bsd/openssh/dist/
gss-serv-krb5.c 85 krb5_principal princ; local
93 &princ))) {
99 if (krb5_kuserok(krb_context, princ, name)) {
106 krb5_free_principal(krb_context, princ);
119 krb5_principal princ; local
141 client->exportedname.value, &princ))) {
149 if ((problem = krb5_cc_initialize(krb_context, ccache, princ))) {
153 krb5_free_principal(krb_context, princ);
158 krb5_free_principal(krb_context, princ);
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
authorize_localname.c 44 krb5_principal princ = (krb5_principal)input_name; local
63 user_ok = krb5_kuserok(context, princ, user);
  /src/external/gpl2/gettext/dist/gettext-tools/tests/
xgettext-elisp-1 11 (princ (_ "help"))
13 (princ (_ "me"))
15 (princ (_ "Hey Jude"))
18 (princ (_ "The Fabulous Four"))
xgettext-librep-1 11 (princ (_ "help"))
13 (princ (_ "me"))
15 (princ (_ "Hey Jude"))
19 (princ (_ "The Fabulous Four"))
  /src/crypto/external/bsd/heimdal/dist/admin/
get.c 128 kadm5_principal_ent_rec princ; local
141 memset(&princ, 0, sizeof(princ));
142 princ.principal = princ_ent;
144 princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX;
146 princ.princ_expire_time = 0;
163 ret = kadm5_create_principal(kadm_handle, &princ, mask, "x");
180 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
190 if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX))
192 princ.attributes &= (~KRB5_KDB_DISALLOW_ALL_TIX)
    [all...]

Completed in 20 milliseconds

1 2 3