HomeSort by: relevance | last modified time | path
    Searched refs:principal (Results 1 - 15 of 15) sorted by relevancy

  /src/lib/libpam/modules/pam_afslog/
pam_afslog.c 57 krb5_principal principal; local
81 kret = krb5_cc_get_principal(ctx, ccache, &principal);
89 ctx, principal),
114 krb5_free_principal(ctx, principal);
  /src/sys/fs/nfs/client/
nfs_clkrpc.c 210 * sure that getting Acceptor credentials for a user principal with a
221 char principal[128]; local
225 error = copyinstr(args->principal, principal,
226 sizeof(principal), NULL);
230 principal[0] = '\0';
246 if (principal[0] != '\0')
247 rpc_gss_set_svc_name_call(principal, "kerberosv5",
  /src/usr.bin/login/
k5login.c 150 * principal, instead of a service/hostname. (Did I miss one?) */
337 char *principal; local
372 asprintf(&principal, "%s/%s", pw->pw_name, instance);
374 principal = strdup(pw->pw_name);
375 if (!principal) {
385 if ((kerror = krb5_parse_name(kcontext, principal, &me)) != 0) {
386 k5_log(kcontext, kerror, "when parsing name %s", principal);
391 k5_log(kcontext, kerror, "when unparsing name %s", principal);
424 printf("%s: Kerberos Password incorrect\n", principal);
  /src/usr.bin/passwd/
krb5_passwd.c 65 (void) fprintf(stderr, "%s %s [-d krb5 | -k] [principal]\n",
73 (void) fprintf(stderr, "%s %s [principal]\n",
83 krb5_principal principal; local
108 * Historical option to specify principal.
127 /* overrides -u <principal> */
152 ret = krb5_parse_name(context, username, &principal);
155 pwkrb5_warn("failed to parse principal", context, ret);
161 principal,
278 krb5_principal principal; local
302 ret = krb5_parse_name (context, username, &principal);
    [all...]
  /src/external/bsd/openldap/dist/contrib/slapd-modules/kinit/
kinit.c 40 static char* principal; variable
71 "Principal in ccache does not match requested principal\n");
215 if (!principal) {
217 principal=ch_calloc(len, 1);
218 snprintf(principal, len, "ldap/%s", global_host_bv.bv_val);
219 Log(LDAP_DEBUG_TRACE, LDAP_LEVEL_DEBUG, "Principal <%s>\n", principal );
222 rc = krb5_parse_name(kid->ctx, principal, &kid->princ);
252 principal = ch_strdup(argv[0])
    [all...]
  /src/sys/fs/nfs/server/
nfs_nfsdkrpc.c 479 char principal[MAXHOSTNAMELEN + 5]; local
484 error = copyinstr(args->principal, principal, sizeof (principal),
507 if (principal[0] != '\0') {
508 ret2 = rpc_gss_set_svc_name_call(principal,
510 ret3 = rpc_gss_set_svc_name_call(principal,
512 ret4 = rpc_gss_set_svc_name_call(principal,
524 if (principal[0] != '\0') {
  /src/external/bsd/wpa/dist/src/pae/
ieee802_1x_kay.c 317 if (participant->principal)
321 wpa_printf(MSG_DEBUG, "KaY: principal participant is not found");
1248 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal,
1254 dl_list_for_each(txsa, &principal->txsc->sa_list,
1275 secy_get_transmit_next_pn(principal->kay, txsa);
1399 if (!participant->principal) {
1400 wpa_printf(MSG_WARNING, "KaY: Participant is not principal");
1711 if (!participant->principal) {
1713 "KaY: I can't accept the distributed SAK as I am not principal");
2344 participant->principal = true
2815 struct ieee802_1x_mka_participant *principal; local
2850 struct ieee802_1x_mka_participant *principal; local
2912 struct ieee802_1x_mka_participant *principal; local
2979 struct ieee802_1x_mka_participant *principal; local
3024 struct ieee802_1x_mka_participant *principal; local
3052 struct ieee802_1x_mka_participant *principal; local
3082 struct ieee802_1x_mka_participant *principal; local
    [all...]
ieee802_1x_kay_i.h 101 bool principal; member in struct:ieee802_1x_mka_participant
  /src/lib/libtelnet/
kerberos5.c 678 krb5_principal principal; local
687 ret = krb5_cc_get_principal(telnet_context, ccache, &principal);
690 printf("KerberosV5: could not get principal: %s\r\n",
696 creds.client = principal;
699 strlen(principal->realm), principal->realm, "krbtgt",
700 principal->realm, NULL);
704 printf("KerberosV5: could not get principal: %s\r\n",
  /src/external/bsd/openldap/dist/libraries/libldap/
gssapi.c 511 gss_name_t *principal )
573 Debug2( LDAP_DEBUG_TRACE, "principal for host[%s]: '%s'\n",
579 gss_rc = gss_import_name( &minor_status, &input_name, &nt_principal, principal );
668 gss_name_t principal = GSS_C_NO_NAME; local
690 rc = guess_service_principal( ld, ldapServiceName, dnsHostName, &principal );
721 principal,
758 principal,
800 if ( principal != GSS_C_NO_NAME ) {
801 gss_release_name( &minor_status, &principal );
  /src/lib/libpam/modules/pam_krb5/
pam_krb5.c 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local
233 /* Get principal name */
235 asprintf(&principal, "%s/%s", (const char *)sourceuser, user);
237 principal = strdup(user);
239 PAM_LOG("Created principal: %s", principal);
241 krbret = krb5_parse_name(pam_context, principal, &princ);
242 free(principal);
252 /* Now convert the principal name into something human readable */
261 PAM_LOG("Got principal: %s", princ_name)
    [all...]
  /src/external/bsd/openldap/dist/contrib/slapd-modules/smbk5pwd/
smbk5pwd.c 287 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal);
302 krb5_get_pw_salt( context, ent.principal, &salt );
303 krb5_free_principal( context, ent.principal );
384 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal);
403 ret = hdb_generate_key_set_password(context, ent.principal,
407 krb5_free_principal( context, ent.principal );
  /src/sys/fs/nfs/common/
nfs.h 178 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfsd_args
187 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfscbd_args
602 int nd_gssnamelen; /* principal name length */
603 char *nd_gssname; /* principal name */
  /src/usr.sbin/sysinst/
msg.mi.fr 727 depuis le menu principal.
1015 retourner au menu principal.
msg.mi.es 719 reinstalar los conjuntos desde el men� principal.}
974 men� principal.
996 { Volver a la lista principal de zonas horarias}
1174 al men� principal. Cuando m�s adelante est� preparado, deber� seleccionar
1175 �actualizar� desde el men� principal para completar la instalaci�n.

Completed in 49 milliseconds