HomeSort by: relevance | last modified time | path
    Searched defs:principal (Results 1 - 25 of 54) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/heimdal/dist/kadmin/
pw_quality.c 43 krb5_principal principal; local
47 ret = krb5_parse_name(context, argv[0], &principal);
55 s = kadm5_check_password_quality (context, principal, &pw_data);
59 krb5_free_principal(context, principal);
check.c 47 krb5_principal principal; local
49 ret = krb5_parse_name(context, name, &principal);
56 ret = kadm5_get_principal(kadm_handle, principal, ent, KADM5_ATTRIBUTES);
57 krb5_free_principal(context, principal);
66 do_check_entry(krb5_principal principal, void *data)
73 ret = krb5_unparse_name(context, principal, &name);
78 ret = kadm5_get_principal(kadm_handle, principal, &princ,
81 krb5_warn(context, ret, "Failed to get principal: %s", name);
93 "Principal %s enctype %d, wrong length: %lu\n",
192 * Check that disallow-all-tix is set on the default principal
    [all...]
  /src/crypto/external/bsd/heimdal/dist/admin/
remove.c 46 krb5_principal principal = NULL; local
50 ret = krb5_parse_name(context, opt->principal_string, &principal);
64 if(principal)
65 krb5_free_principal(context, principal);
70 if (!principal && !enctype && !opt->kvno_integer) {
73 "principal, enctype or kvno.");
83 entry.principal = principal;
91 if(principal)
92 krb5_free_principal(context, principal);
    [all...]
purge.c 41 * keep track of the highest version for every principal.
45 krb5_principal principal; member in struct:e
57 if (krb5_principal_compare (context, princ, e->principal))
79 ret = krb5_copy_principal (context, princ, &e->principal);
93 krb5_free_principal (context, head->principal);
131 add_entry (entry.principal, entry.vno, entry.timestamp, &head);
145 struct e *e = get_entry (entry.principal, head);
157 krb5_unparse_name (context, entry.principal, &name_str);
change.c 42 krb5_principal principal, krb5_kvno kvno,
53 ret = krb5_unparse_name (context, principal, &client_name);
62 realm = krb5_principal_get_realm(context, principal);
101 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys);
112 new_entry.principal = principal;
131 krb5_principal principal; member in struct:change_set
163 if (krb5_principal_compare (context, changeset[i].principal,
164 entry.principal)) {
186 if (krb5_principal_compare (context, princ, entry.principal))
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
default_keys.c 84 parse_file(krb5_context context, krb5_principal principal, int no_salt)
90 ret = hdb_generate_key_set(context, principal, NULL, 0, &keys, &nkeys,
105 krb5_principal principal; local
111 ret = krb5_parse_name(context, "lha@SU.SE", &principal);
115 parse_file(context, principal, 0);
116 parse_file(context, principal, 1);
118 krb5_free_principal(context, principal);
test_pw_quality.c 47 static char *principal; variable
51 { "principal", 0, arg_string, &principal, NULL, NULL },
76 if (principal == NULL)
77 krb5_errx(context, 1, "no principal given");
81 ret = krb5_parse_name(context, principal, &p);
83 krb5_errx(context, 1, "krb5_parse_name: %s", principal);
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
test_kuserok.c 55 "principal luser");
64 krb5_principal principal; local
91 ret = krb5_parse_name(context, argv[0], &principal);
95 ret = krb5_unparse_name(context, principal, &p);
99 ret = krb5_kuserok(context, principal, argv[1]);
101 krb5_free_principal(context, principal);
store-test.c 75 krb5_principal principal; local
108 krb5_make_principal(context, &principal, "TEST", "foobar", NULL);
109 krb5_store_principal(sp, principal);
110 krb5_free_principal(context, principal);
111 nerr += compare("Principal", sp, "\x0\x0\x0\x1"
string-to-key-test.c 106 /* to enable realm-less principal name above */
112 krb5_principal principal; local
115 ret = krb5_parse_name (context, t->principal_name, &principal);
120 principal, &key);
123 krb5_free_principal (context, principal);
test_ap-req.c 53 "let server pick the principal", NULL },
170 const char *principal, *keytab, *ccache; local
194 principal = argv[0];
206 ret = krb5_parse_name(context, principal, &sprincipal);
deprecated.c 317 krb5_principal principal = args->principal; variable
327 ret = krb5_kt_get_entry (context, real_keytab, principal,
359 a.principal = creds->client;
404 krb5_principal principal)
407 return &principal->realm;
419 krb5_principal principal,
423 principal->realm = *realm;
  /src/lib/libpam/modules/pam_afslog/
pam_afslog.c 57 krb5_principal principal; local
81 kret = krb5_cc_get_principal(ctx, ccache, &principal);
89 ctx, principal),
114 krb5_free_principal(ctx, principal);
  /src/sys/fs/nfs/client/
nfs_clkrpc.c 210 * sure that getting Acceptor credentials for a user principal with a
221 char principal[128]; local
225 error = copyinstr(args->principal, principal,
226 sizeof(principal), NULL);
230 principal[0] = '\0';
246 if (principal[0] != '\0')
247 rpc_gss_set_svc_name_call(principal, "kerberosv5",
  /src/crypto/external/bsd/heimdal/dist/kuser/
kverify.c 52 "[principal]");
65 krb5_principal principal = NULL; local
99 ret = krb5_parse_name(context, argv[0], &principal);
103 ret = krb5_get_default_principal(context, &principal);
111 principal,
  /src/crypto/external/bsd/heimdal/dist/lib/hdb/
test_hdbkeys.c 55 krb5_principal principal; local
86 ret = krb5_parse_name (context, principal_str, &principal);
98 ret = hdb_generate_key_set_password(context, principal, password_str,
107 krb5_free_principal (context, principal);
  /src/usr.bin/passwd/
krb5_passwd.c 65 (void) fprintf(stderr, "%s %s [-d krb5 | -k] [principal]\n",
73 (void) fprintf(stderr, "%s %s [principal]\n",
83 krb5_principal principal; local
108 * Historical option to specify principal.
127 /* overrides -u <principal> */
152 ret = krb5_parse_name(context, username, &principal);
155 pwkrb5_warn("failed to parse principal", context, ret);
161 principal,
278 krb5_principal principal; local
302 ret = krb5_parse_name (context, username, &principal);
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
string2key.c 42 char *principal; variable
57 { "principal",'p', arg_string, &principal, "Kerberos v5 principal to use", "principal" },
145 if(version5 && principal == NULL){
146 printf("Kerberos v5 principal: ");
150 principal = estrdup(buf);
168 ret = krb5_parse_name(context, principal, &princ);
170 krb5_err(context, 1, ret, "failed to unparse name: %s", principal);
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kpasswd/
kpasswd.c 45 { "admin-principal", 0, arg_string, &admin_principal_str, NULL,
55 arg_printusage (a, num_args, NULL, "[principal ...]");
61 krb5_principal principal,
75 if (principal == NULL)
78 ret = krb5_unparse_name(context, principal, &name);
98 principal,
124 krb5_principal principal; local
227 ret = krb5_parse_name (context, argv[0], &principal);
231 ret = change_password(context, principal, id);
234 krb5_free_principal(context, principal);
    [all...]
kpasswd-generator.c 97 krb5_principal principal; local
108 ret = krb5_parse_name(context, name, &principal);
121 principal,
138 principal,
149 krb5_free_principal(context, principal);
  /src/sys/fs/nfs/server/
nfs_nfsdkrpc.c 479 char principal[MAXHOSTNAMELEN + 5]; local
484 error = copyinstr(args->principal, principal, sizeof (principal),
507 if (principal[0] != '\0') {
508 ret2 = rpc_gss_set_svc_name_call(principal,
510 ret3 = rpc_gss_set_svc_name_call(principal,
512 ret4 = rpc_gss_set_svc_name_call(principal,
524 if (principal[0] != '\0') {
  /src/usr.bin/login/
k5login.c 150 * principal, instead of a service/hostname. (Did I miss one?) */
337 char *principal; local
372 asprintf(&principal, "%s/%s", pw->pw_name, instance);
374 principal = strdup(pw->pw_name);
375 if (!principal) {
385 if ((kerror = krb5_parse_name(kcontext, principal, &me)) != 0) {
386 k5_log(kcontext, kerror, "when parsing name %s", principal);
391 k5_log(kcontext, kerror, "when unparsing name %s", principal);
424 printf("%s: Kerberos Password incorrect\n", principal);
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
kdc.c 66 krb5_principal principal = NULL; local
85 KRB5_NT_SRV_HST, &principal);
89 ret = krb5_cc_cache_match(context, principal, id);
114 principal,
149 if (principal)
150 krb5_free_principal(context, principal);
  /src/external/bsd/openldap/dist/contrib/slapd-modules/kinit/
kinit.c 40 static char* principal; variable
71 "Principal in ccache does not match requested principal\n");
215 if (!principal) {
217 principal=ch_calloc(len, 1);
218 snprintf(principal, len, "ldap/%s", global_host_bv.bv_val);
219 Log(LDAP_DEBUG_TRACE, LDAP_LEVEL_DEBUG, "Principal <%s>\n", principal );
222 rc = krb5_parse_name(kid->ctx, principal, &kid->princ);
252 principal = ch_strdup(argv[0])
    [all...]
  /src/lib/libtelnet/
kerberos5.c 678 krb5_principal principal; local
687 ret = krb5_cc_get_principal(telnet_context, ccache, &principal);
690 printf("KerberosV5: could not get principal: %s\r\n",
696 creds.client = principal;
699 strlen(principal->realm), principal->realm, "krbtgt",
700 principal->realm, NULL);
704 printf("KerberosV5: could not get principal: %s\r\n",

Completed in 37 milliseconds

1 2 3