Home
last modified time | relevance | path

Searched full:principal (Results 1 – 25 of 799) sorted by relevance

12345678910>>...32

/freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/
H A Dkrb5_principal.31 .TH "Heimdal Kerberos 5 principal functions" 3 "11 Jan 2012" "Version 1.5.2" "HeimdalKerberos5libra…
5 Heimdal Kerberos 5 principal functions \-
13 …_LIB_CALL \fBkrb5_principal_set_type\fP (krb5_context context, krb5_principal principal, int type)"
16 …KRB5_LIB_CALL \fBkrb5_principal_get_type\fP (krb5_context context, krb5_const_principal principal)"
19 …RB5_LIB_CALL \fBkrb5_principal_get_realm\fP (krb5_context context, krb5_const_principal principal)"
22 …_LIB_CALL \fBkrb5_principal_get_num_comp\fP (krb5_context context, krb5_const_principal principal)"
25 …parse_name_flags\fP (krb5_context context, const char *name, int flags, krb5_principal *principal)"
28 …LIB_CALL \fBkrb5_parse_name\fP (krb5_context context, const char *name, krb5_principal *principal)"
31 …Bkrb5_unparse_name_fixed\fP (krb5_context context, krb5_const_principal principal, char *name, siz…
34 …unparse_name_fixed_short\fP (krb5_context context, krb5_const_principal principal, char *name, siz…
[all …]
/freebsd/crypto/heimdal/lib/krb5/
H A Dprincipal.c35 * @page krb5_principal_intro The principal handing functions.
37 * A Kerberos principal is a email address looking string that
39 * realm the principal belongs to and the former is a list of 0 or
67 * Frees a Kerberos principal allocated by the library with
69 * principal functions.
72 * @param p a principal to free.
90 * Set the type of the principal
93 * @param principal principal to set the type for
103 krb5_principal principal, in krb5_principal_set_type() argument
106 princ_type(principal) = type; in krb5_principal_set_type()
[all …]
H A Dkrb5_principal.367 .Nd Kerberos 5 principal handling functions
75 .Fn krb5_free_principal "krb5_context context" "krb5_principal principal"
77 .Fn krb5_parse_name "krb5_context context" "const char *name" "krb5_principal *principal"
79 …_parse_name_flags "krb5_context context" "const char *name" "int flags" "krb5_principal *principal"
81 .Fn "krb5_unparse_name" "krb5_context context" "krb5_const_principal principal" "char **name"
83 .Fn "krb5_unparse_name_flags" "krb5_context context" "krb5_const_principal principal" "int flags" "…
85 .Fn krb5_unparse_name_fixed "krb5_context context" "krb5_const_principal principal" "char *name" "s…
87 .Fn krb5_unparse_name_fixed_flags "krb5_context context" "krb5_const_principal principal" "int flag…
89 .Fn "krb5_unparse_name_short" "krb5_context context" "krb5_const_principal principal" "char **name"
91 .Fn krb5_unparse_name_fixed_short "krb5_context context" "krb5_const_principal principal" "char *na…
[all …]
H A Dkrb5_verify_user.355 .Fn "krb5_verify_user" "krb5_context context" " krb5_principal principal" "krb5_ccache ccache" "con…
57 .Fn "krb5_verify_user_lrealm" "krb5_context context" "krb5_principal principal" "krb5_ccache ccache…
77 .Fa "krb5_principal principal"
85 The principal whose password will be verified is specified in
86 .Fa principal .
121 .Fa principal
124 After a successful return, the principal is set to the authenticated
125 realm. If the call fails, the principal will not be meaningful, and
171 principal that user of
186 .Fa principal
[all …]
/freebsd/crypto/krb5/src/man/
H A Dkadmin.man38 [\fB\-p\fP \fIprincipal\fP]
47 [\fB\-p\fP \fIprincipal\fP]
66 using the service principal \fBkadmin/admin\fP or \fBkadmin/ADMINHOST\fP
71 \fB\-k\fP options are used to specify the client Kerberos principal name
72 used to authenticate. Once kadmin has determined the principal name,
86 \fB\-p\fP \fIprincipal\fP
87 Use \fIprincipal\fP to authenticate. Otherwise, kadmin will append
88 \fB/admin\fP to the primary principal name of the default ccache,
94 a password. In this case, the default principal will be
106 \fI\%krb5.conf\fP\&. Then use the \fB\-n\fP option with a principal
[all …]
H A Dksu.man71 authentication and authorization. Resolving the target principal name
73 principal name with the \fB\-n\fP option (e.g., \fB\-n jqpublic@USC.EDU\fP)
74 or a default principal name will be assigned using a heuristic
84 ticket (TGT) for the target principal\(aqs realm. If the ticket for the
101 principal is authorized to access the target account. In the target
104 contains the name of a principal that is authorized to access the
119 The format of .k5users is the same, except the principal name may be
120 followed by a list of commands that the principal is authorized to
123 Thus if the target principal name is found in the .k5login file the
125 looks in the .k5users file. If the target principal name is found
[all …]
H A Dk5identity.man32 k5identity \- Kerberos V5 client principal selection rules
44 \fIprincipal\fP \fIfield\fP=\fIvalue\fP ...
48 If the server principal meets all of the field constraints, then
49 principal is chosen as the client principal. The following fields are
54 If the realm of the server principal is known, it is matched
61 If the server principal is a host\-based principal, its service
66 If the server principal is a host\-based principal, its hostname
70 If the server principal matches the constraints of multiple lines
71 in the .k5identity file, the principal from the first matching
78 The following example .k5identity file selects the client principal
[all …]
H A Dkdb5_util.man67 specifies the name under which the principal database is stored;
82 principal name for the master key in the database. If not
133 Stores the master principal\(aqs keys in a stash file. The \fB\-f\fP
168 causes the name of each principal and policy to be printed as it
173 re\-encrypt principal key data in the dumpfile. The principal keys
242 causes the name of each principal and policy to be printed as it
254 \fBark\fP [\fB\-e\fP \fIenc\fP:\fIsalt\fP,...] \fIprincipal\fP
258 Adds new random keys to \fIprincipal\fP at the next available key version
269 Adds a new master key to the master key principal, but does not mark
290 created principal keys. If no \fItime\fP argument is given, the current
[all …]
H A Dkadm5.acl.man52 principal permissions [target_principal [restrictions] ]
61 will control access for an actor principal on a target principal.
66 .B \fIprincipal\fP
67 (Partially or fully qualified Kerberos principal name.) Specifies
68 the principal whose permissions are to be set.
75 \fIprincipal\fP matching a particular entry. This is a string of one or
105 [Dis]allows the extraction of principal keys
129 [Dis]allows the propagation of the principal database (used in \fI\%Incremental database propagatio…
135 [Dis]allows the explicit setting of the key for a principal
161 \fBlockdown_keys\fP principal attribute can be used to prevent
[all …]
H A Dkinit.man56 [\fIprincipal\fP]
60 \fIprincipal\fP\&. If \fIprincipal\fP is absent, kinit chooses an appropriate
61 principal name based on existing credential cache contents or the
63 choice of principal name.
112 requests canonicalization of the principal name, and allows the
113 KDC to reply with a different client principal from the one
117 treats the principal name as an enterprise name.
141 but any principal may be specified. On a KDC, the special keytab
144 administrator to obtain tickets as any principal that supports
153 Then use the \fB\-n\fP option with a principal of the form \fB@REALM\fP
[all …]
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/
H A DPrincipals.htm11principal is your Kerberos identity. It is your user name plus the Kerberos <a href="JavaScript:po…
18 <li><a href=#single-principal> Using a single principal </a></li>
20 <li><a href=#default-principal> Default principal</a></li>
24 <H2><a name="single-principal">Using a Single Principal</a></H2>
26 If like many users you just have one Kerberos identity, you will have just one principal.
28principal in the Get Ticket window it will auto-complete the realm for you. If you select the "Rem…
30 The main window shows your principal, along with information about tickets issued to it. <br>
38 …. For example, administrators often have one principal with standard access and an administrative
40 …ge Multiple Principals</a> <br> <a href="HTML/Make_Default.htm">How to: Make Default Principal</a>
45 <H2> <a name="default-principal">Default Principal</a></H2>
[all …]
H A DManage_Multiple_Principals.htm13 …er them in the Get Ticket window. Kerberos will then auto-complete your principal as you start to …
14 <li>The Make Default button lets you easily and quickly change the default principal.</li>
19 All of your principals with tickets are listed in the main window. The default principal is in bold…
38 <li><a href=HTML/Make_Default.htm> Set the default principal</a></li>
51principal for the first time, enter the principal in the Principal field of the Get Ticket window.…
54 <th id="th2">Select principal before using buttons</th>
56 Select a principal in the main window by clicking it. The selected principal will now be affected b…
62 …wed automatically. To renew tickets just for some principals, click the principal(s) with tickets …
65 <th id="th2">Choose default principal</th>
67principal's tickets are used by default when you access a Kerberized service, select a principal i…
[all …]
H A DMake_Default.htm9 <H1> Make Default Principal </H1>
11principal is the one whose tickets are used when an application or service asks for tickets withou…
13 If you have only one principal, that principal is automatically the default.</p>
15 <H3>Set Default Principal</H3>
17 <li>Select the principal by clicking it in the main window (if the principal is not listed, first g…
21 The default principal appears in bold font in the main window.</p>
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dt_ref_kerb.out1 parsed (and unparsed) principal(tytso): 'tytso@ATHENA.MIT.EDU'
2 parsed (and unparsed) principal(tytso@SHAZAAM): MATCH
3 parsed (and unparsed) principal(tytso/root@VEGGIE.COM): MATCH
4 parsed (and unparsed) principal(tytso/tuber/carrot@VEGGIE.COM): MATCH
5 parsed (and unparsed) principal(tytso/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/p/q/r/s/t): 'tytso/a/b/c/d/e/f/…
6 parsed (and unparsed) principal(tytso/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/p/q/r/s/t@FOO): MATCH
7 parsed (and unparsed) principal(tytso\\0/\0@B\n\t\\GAG): MATCH
8 parsed (and unparsed) principal(tytso/\n/\b\t@B\0hacky-test): MATCH
9 parsed (and unparsed) principal(\/slash/\@atsign/octa\/thorpe@\/slash\@at\/sign): MATCH
10 name_type principal(host/www.krb5.test@KRB5.TEST): 1
[all …]
H A Dunparse.c30 * Rewritten by Theodore Ts'o to properly unparse principal names
40 * converts the multi-part principal format used in the protocols to a
52 * KRB_PARSE_MALFORMED principal is invalid (does not contain
137 k5_unparse_name(krb5_context context, krb5_const_principal principal, in k5_unparse_name() argument
146 if (!principal || !name) in k5_unparse_name()
159 if (krb5_realm_compare(context, &p, principal)) in k5_unparse_name()
164 totalsize += component_length_quoted(&principal->realm, flags); in k5_unparse_name()
168 for (i = 0; i < principal->length; i++) { in k5_unparse_name()
169 totalsize += component_length_quoted(&principal->data[i], flags); in k5_unparse_name()
172 if (principal->length == 0) in k5_unparse_name()
[all …]
/freebsd/contrib/pam-krb5/module/
H A Dalt-auth.c4 * pam-krb5 supports a feature where the principal for authentication can be
33 * Map the user to a Kerberos principal according to alt_auth_map. Returns 0
34 * on success, storing the mapped principal name in newly allocated memory in
35 * principal. The caller is responsible for freeing. Returns an errno value
40 char **principal) in pamk5_map_principal() argument
69 /* Now, allocate a string and build the principal. */ in pamk5_map_principal()
82 *principal = malloc(needed); in pamk5_map_principal()
83 if (*principal == NULL) in pamk5_map_principal()
88 memcpy(*principal + offset, user, strlen(user)); in pamk5_map_principal()
92 (*principal)[offset] = *p; in pamk5_map_principal()
[all …]
/freebsd/crypto/heimdal/admin/
H A Dktutil.863 .It add Oo Fl p Ar principal Oc Oo Fl Fl principal= Ns Ar principal Oc \
70 principal to add; if what you really want is to add a new principal to
87 .It get Oo Fl p Ar admin principal Oc \
88 Oo Fl Fl principal= Ns Ar admin principal Oc Oo Fl e Ar enctype Oc \
92 Oo Fl Fl server-port= Ns Ar server port Oc Ar principal ...
94 .Ar principal ,
101 principal.
104 .It remove Oo Fl p Ar principal Oc Oo Fl Fl principal= Ns Ar principal Oc \
112 .It rename Ar from-principal Ar to-principal
114 .Ar from-principal
[all …]
/freebsd/lib/librpcsec_gss/
H A Drpc_gss_get_principal_name.330 .Nd "Get a principal name"
37 .Fa "rpc_gss_principal_t *principal"
44 This function can be used to generate a client principal name from
47 .Bl -tag -width ".It principal"
48 .It principal
49 If the principal is created successfully,
50 .Fa *principal
51 will be set to point at the new principal in GSS-API exported name form
53 The name of the mechanism for this principal
55 The name part of the principal
[all …]
/freebsd/crypto/heimdal/kadmin/
H A Dkadmin.843 .Op Fl p Ar string \*(Ba Fl Fl principal= Ns Ar string
66 .It Fl p Ar string , Fl Fl principal= Ns Ar string
67 principal to authenticate as
69 keytab for authentication principal
113 .Ar principal...
115 Adds a new principal to the database. The options not passed on the
121 .Ar principal enctypes...
124 Adds a new encryption type to the principal, only random key are
129 .Ar principal...
131 Removes a principal.
[all …]
H A Dkadmin-commands.in146 help = "principal's password"
169 help = "principal attributes"
175 help = "principal expiration time"
188 argument = "principal..."
190 help = "Adds a principal to the database."
219 argument = "principal..."
228 argument = "principal..."
234 argument = "principal enctype..."
236 help = "Delete all the mentioned enctypes for principal."
246 argument = "principal enctype..."
[all …]
H A Dcpw.c45 set_random_key (krb5_principal principal) in set_random_key() argument
52 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys); in set_random_key()
62 set_random_password (krb5_principal principal) in set_random_password() argument
68 ret = kadm5_chpass_principal(kadm_handle, principal, pw); in set_random_password()
72 krb5_unparse_name(context, principal, &princ_name); in set_random_password()
82 set_password (krb5_principal principal, char *password) in set_password() argument
91 krb5_unparse_name(context, principal, &princ_name); in set_password()
102 ret = kadm5_chpass_principal(kadm_handle, principal, password); in set_password()
108 set_key_data (krb5_principal principal, krb5_key_data *key_data) in set_key_data() argument
112 ret = kadm5_chpass_principal_with_key (kadm_handle, principal, in set_key_data()
[all …]
/freebsd/contrib/pam-krb5/tests/config/
H A DREADME8 A keytab for a principal (in the same realm as the test principal
10 that test principal. For an MIT Kerberos KDC, it needs "mci"
11 permissions in kadm5.acl for that principal. For a Heimdal KDC, it
14 modification of a principal will be skipped.
29 An optional keytab for a principal, which generally should be in the
36 fully-qualified principal (including the realm) of a Kerberos
37 principal to use for testing authentication. The second line is the
38 password for that principal.
40 If the realm of the principal is not configured in either DNS or in
49 authentication for the user listed in the pkinit-principal file.
[all …]
/freebsd/crypto/heimdal/doc/doxyout/krb5/html/
H A Dgroup__krb5__principal.html3 <title>HeimdalKerberos5library: Heimdal Kerberos 5 principal functions</title>
23 <h1>Heimdal Kerberos 5 principal functions</h1><table border="0" cellpadding="0" cellspacing="0">
30 …0313">krb5_principal_set_type</a> (krb5_context context, krb5_principal principal, int type)</td><…
32 …e67b7">krb5_principal_get_type</a> (krb5_context context, krb5_const_principal principal)</td></tr>
35 …6362">krb5_principal_get_realm</a> (krb5_context context, krb5_const_principal principal)</td></tr>
38 …c">krb5_principal_get_num_comp</a> (krb5_context context, krb5_const_principal principal)</td></tr>
41 …_flags</a> (krb5_context context, const char *name, int flags, krb5_principal *principal)</td></tr>
44 …">krb5_parse_name</a> (krb5_context context, const char *name, krb5_principal *principal)</td></tr>
47 …krb5_unparse_name_fixed</a> (krb5_context context, krb5_const_principal principal, char *name, siz…
50 …nparse_name_fixed_short</a> (krb5_context context, krb5_const_principal principal, char *name, siz…
[all …]
/freebsd/crypto/krb5/src/lib/krb5/keytab/
H A Dt_keytab.c126 /* Try to lookup unknown principal - when keytab does not exist*/ in kt_test()
128 CHECK(kret, "parsing principal"); in kt_test()
143 * Add the following for this principal in kt_test()
150 kent.principal = princ; in kt_test()
216 /* Try to lookup unknown principal - now that keytab exists*/ in kt_test()
218 CHECK(kret, "parsing principal"); in kt_test()
226 /* Try to lookup known principal */ in kt_test()
228 CHECK(kret, "parsing principal"); in kt_test()
231 CHECK(kret, "looking up principal"); in kt_test()
234 if (!krb5_principal_compare(context, princ, kent.principal) || in kt_test()
[all …]
/freebsd/crypto/heimdal/lib/gssapi/krb5/
H A Dacquire_cred.c40 krb5_principal principal, in __gsskrb5_ccache_lifetime() argument
48 in_cred.client = principal; in __gsskrb5_ccache_lifetime()
50 realm = krb5_principal_get_realm(context, principal); in __gsskrb5_ccache_lifetime()
131 * If we have a preferred principal, lets try to find it in all in acquire_initiator_cred()
142 if (handle->principal) { in acquire_initiator_cred()
144 handle->principal, in acquire_initiator_cred()
163 } else if (handle->principal == NULL) { in acquire_initiator_cred()
164 kret = krb5_copy_principal(context, def_princ, &handle->principal); in acquire_initiator_cred()
167 } else if (handle->principal != NULL && in acquire_initiator_cred()
168 krb5_principal_compare(context, handle->principal, in acquire_initiator_cred()
[all …]

12345678910>>...32