| /src/lib/libpam/modules/pam_afslog/ |
| pam_afslog.c | 57 krb5_principal principal; local 81 kret = krb5_cc_get_principal(ctx, ccache, &principal); 89 ctx, principal), 114 krb5_free_principal(ctx, principal);
|
| /src/sys/fs/nfs/client/ |
| nfs_clkrpc.c | 210 * sure that getting Acceptor credentials for a user principal with a 221 char principal[128]; local 225 error = copyinstr(args->principal, principal, 226 sizeof(principal), NULL); 230 principal[0] = '\0'; 246 if (principal[0] != '\0') 247 rpc_gss_set_svc_name_call(principal, "kerberosv5",
|
| /src/usr.bin/login/ |
| k5login.c | 150 * principal, instead of a service/hostname. (Did I miss one?) */ 337 char *principal; local 372 asprintf(&principal, "%s/%s", pw->pw_name, instance); 374 principal = strdup(pw->pw_name); 375 if (!principal) { 385 if ((kerror = krb5_parse_name(kcontext, principal, &me)) != 0) { 386 k5_log(kcontext, kerror, "when parsing name %s", principal); 391 k5_log(kcontext, kerror, "when unparsing name %s", principal); 424 printf("%s: Kerberos Password incorrect\n", principal);
|
| /src/usr.bin/passwd/ |
| krb5_passwd.c | 65 (void) fprintf(stderr, "%s %s [-d krb5 | -k] [principal]\n", 73 (void) fprintf(stderr, "%s %s [principal]\n", 83 krb5_principal principal; local 108 * Historical option to specify principal. 127 /* overrides -u <principal> */ 152 ret = krb5_parse_name(context, username, &principal); 155 pwkrb5_warn("failed to parse principal", context, ret); 161 principal, 278 krb5_principal principal; local 302 ret = krb5_parse_name (context, username, &principal); [all...] |
| /src/external/bsd/openldap/dist/contrib/slapd-modules/kinit/ |
| kinit.c | 40 static char* principal; variable 71 "Principal in ccache does not match requested principal\n"); 215 if (!principal) { 217 principal=ch_calloc(len, 1); 218 snprintf(principal, len, "ldap/%s", global_host_bv.bv_val); 219 Log(LDAP_DEBUG_TRACE, LDAP_LEVEL_DEBUG, "Principal <%s>\n", principal ); 222 rc = krb5_parse_name(kid->ctx, principal, &kid->princ); 252 principal = ch_strdup(argv[0]) [all...] |
| /src/sys/fs/nfs/server/ |
| nfs_nfsdkrpc.c | 479 char principal[MAXHOSTNAMELEN + 5]; local 484 error = copyinstr(args->principal, principal, sizeof (principal), 507 if (principal[0] != '\0') { 508 ret2 = rpc_gss_set_svc_name_call(principal, 510 ret3 = rpc_gss_set_svc_name_call(principal, 512 ret4 = rpc_gss_set_svc_name_call(principal, 524 if (principal[0] != '\0') {
|
| /src/external/bsd/wpa/dist/src/pae/ |
| ieee802_1x_kay.c | 317 if (participant->principal) 321 wpa_printf(MSG_DEBUG, "KaY: principal participant is not found"); 1248 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, 1254 dl_list_for_each(txsa, &principal->txsc->sa_list, 1275 secy_get_transmit_next_pn(principal->kay, txsa); 1399 if (!participant->principal) { 1400 wpa_printf(MSG_WARNING, "KaY: Participant is not principal"); 1711 if (!participant->principal) { 1713 "KaY: I can't accept the distributed SAK as I am not principal"); 2344 participant->principal = true 2815 struct ieee802_1x_mka_participant *principal; local 2850 struct ieee802_1x_mka_participant *principal; local 2912 struct ieee802_1x_mka_participant *principal; local 2979 struct ieee802_1x_mka_participant *principal; local 3024 struct ieee802_1x_mka_participant *principal; local 3052 struct ieee802_1x_mka_participant *principal; local 3082 struct ieee802_1x_mka_participant *principal; local [all...] |
| ieee802_1x_kay_i.h | 101 bool principal; member in struct:ieee802_1x_mka_participant
|
| /src/lib/libtelnet/ |
| kerberos5.c | 678 krb5_principal principal; local 687 ret = krb5_cc_get_principal(telnet_context, ccache, &principal); 690 printf("KerberosV5: could not get principal: %s\r\n", 696 creds.client = principal; 699 strlen(principal->realm), principal->realm, "krbtgt", 700 principal->realm, NULL); 704 printf("KerberosV5: could not get principal: %s\r\n",
|
| /src/external/bsd/openldap/dist/libraries/libldap/ |
| gssapi.c | 511 gss_name_t *principal ) 573 Debug2( LDAP_DEBUG_TRACE, "principal for host[%s]: '%s'\n", 579 gss_rc = gss_import_name( &minor_status, &input_name, &nt_principal, principal ); 668 gss_name_t principal = GSS_C_NO_NAME; local 690 rc = guess_service_principal( ld, ldapServiceName, dnsHostName, &principal ); 721 principal, 758 principal, 800 if ( principal != GSS_C_NO_NAME ) { 801 gss_release_name( &minor_status, &principal );
|
| /src/lib/libpam/modules/pam_krb5/ |
| pam_krb5.c | 133 char *principal, *princ_name, *ccache_name, luser[32], *srvdup; local 233 /* Get principal name */ 235 asprintf(&principal, "%s/%s", (const char *)sourceuser, user); 237 principal = strdup(user); 239 PAM_LOG("Created principal: %s", principal); 241 krbret = krb5_parse_name(pam_context, principal, &princ); 242 free(principal); 252 /* Now convert the principal name into something human readable */ 261 PAM_LOG("Got principal: %s", princ_name) [all...] |
| /src/external/bsd/openldap/dist/contrib/slapd-modules/smbk5pwd/ |
| smbk5pwd.c | 287 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal); 302 krb5_get_pw_salt( context, ent.principal, &salt ); 303 krb5_free_principal( context, ent.principal ); 384 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal); 403 ret = hdb_generate_key_set_password(context, ent.principal, 407 krb5_free_principal( context, ent.principal );
|
| /src/sys/fs/nfs/common/ |
| nfs.h | 178 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfsd_args 187 const char *principal; /* GSS-API service principal name */ member in struct:nfsd_nfscbd_args 602 int nd_gssnamelen; /* principal name length */ 603 char *nd_gssname; /* principal name */
|
| /src/usr.sbin/sysinst/ |
| msg.mi.fr | 727 depuis le menu principal. 1015 retourner au menu principal.
|
| msg.mi.es | 719 reinstalar los conjuntos desde el men� principal.} 974 men� principal. 996 { Volver a la lista principal de zonas horarias} 1174 al men� principal. Cuando m�s adelante est� preparado, deber� seleccionar 1175 �actualizar� desde el men� principal para completar la instalaci�n.
|