| /freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/ |
| H A D | krb5_principal.3 | 1 .TH "Heimdal Kerberos 5 principal functions" 3 "11 Jan 2012" "Version 1.5.2" "HeimdalKerberos5libra… 5 Heimdal Kerberos 5 principal functions \- 13 …_LIB_CALL \fBkrb5_principal_set_type\fP (krb5_context context, krb5_principal principal, int type)" 16 …KRB5_LIB_CALL \fBkrb5_principal_get_type\fP (krb5_context context, krb5_const_principal principal)" 19 …RB5_LIB_CALL \fBkrb5_principal_get_realm\fP (krb5_context context, krb5_const_principal principal)" 22 …_LIB_CALL \fBkrb5_principal_get_num_comp\fP (krb5_context context, krb5_const_principal principal)" 25 …parse_name_flags\fP (krb5_context context, const char *name, int flags, krb5_principal *principal)" 28 …LIB_CALL \fBkrb5_parse_name\fP (krb5_context context, const char *name, krb5_principal *principal)" 31 …Bkrb5_unparse_name_fixed\fP (krb5_context context, krb5_const_principal principal, char *name, siz… 34 …unparse_name_fixed_short\fP (krb5_context context, krb5_const_principal principal, char *name, siz… [all …]
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | principal.c | 35 * @page krb5_principal_intro The principal handing functions. 37 * A Kerberos principal is a email address looking string that 39 * realm the principal belongs to and the former is a list of 0 or 67 * Frees a Kerberos principal allocated by the library with 69 * principal functions. 72 * @param p a principal to free. 90 * Set the type of the principal 93 * @param principal principal to set the type for 103 krb5_principal principal, in krb5_principal_set_type() argument 106 princ_type(principal) = type; in krb5_principal_set_type() [all …]
|
| H A D | krb5_principal.3 | 67 .Nd Kerberos 5 principal handling functions 75 .Fn krb5_free_principal "krb5_context context" "krb5_principal principal" 77 .Fn krb5_parse_name "krb5_context context" "const char *name" "krb5_principal *principal" 79 …_parse_name_flags "krb5_context context" "const char *name" "int flags" "krb5_principal *principal" 81 .Fn "krb5_unparse_name" "krb5_context context" "krb5_const_principal principal" "char **name" 83 .Fn "krb5_unparse_name_flags" "krb5_context context" "krb5_const_principal principal" "int flags" "… 85 .Fn krb5_unparse_name_fixed "krb5_context context" "krb5_const_principal principal" "char *name" "s… 87 .Fn krb5_unparse_name_fixed_flags "krb5_context context" "krb5_const_principal principal" "int flag… 89 .Fn "krb5_unparse_name_short" "krb5_context context" "krb5_const_principal principal" "char **name" 91 .Fn krb5_unparse_name_fixed_short "krb5_context context" "krb5_const_principal principal" "char *na… [all …]
|
| H A D | krb5_verify_user.3 | 55 .Fn "krb5_verify_user" "krb5_context context" " krb5_principal principal" "krb5_ccache ccache" "con… 57 .Fn "krb5_verify_user_lrealm" "krb5_context context" "krb5_principal principal" "krb5_ccache ccache… 77 .Fa "krb5_principal principal" 85 The principal whose password will be verified is specified in 86 .Fa principal . 121 .Fa principal 124 After a successful return, the principal is set to the authenticated 125 realm. If the call fails, the principal will not be meaningful, and 171 principal that user of 186 .Fa principal [all …]
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kadmin.man | 38 [\fB\-p\fP \fIprincipal\fP] 47 [\fB\-p\fP \fIprincipal\fP] 66 using the service principal \fBkadmin/admin\fP or \fBkadmin/ADMINHOST\fP 71 \fB\-k\fP options are used to specify the client Kerberos principal name 72 used to authenticate. Once kadmin has determined the principal name, 86 \fB\-p\fP \fIprincipal\fP 87 Use \fIprincipal\fP to authenticate. Otherwise, kadmin will append 88 \fB/admin\fP to the primary principal name of the default ccache, 94 a password. In this case, the default principal will be 106 \fI\%krb5.conf\fP\&. Then use the \fB\-n\fP option with a principal [all …]
|
| H A D | ksu.man | 71 authentication and authorization. Resolving the target principal name 73 principal name with the \fB\-n\fP option (e.g., \fB\-n jqpublic@USC.EDU\fP) 74 or a default principal name will be assigned using a heuristic 84 ticket (TGT) for the target principal\(aqs realm. If the ticket for the 101 principal is authorized to access the target account. In the target 104 contains the name of a principal that is authorized to access the 119 The format of .k5users is the same, except the principal name may be 120 followed by a list of commands that the principal is authorized to 123 Thus if the target principal name is found in the .k5login file the 125 looks in the .k5users file. If the target principal name is found [all …]
|
| H A D | k5identity.man | 32 k5identity \- Kerberos V5 client principal selection rules 44 \fIprincipal\fP \fIfield\fP=\fIvalue\fP ... 48 If the server principal meets all of the field constraints, then 49 principal is chosen as the client principal. The following fields are 54 If the realm of the server principal is known, it is matched 61 If the server principal is a host\-based principal, its service 66 If the server principal is a host\-based principal, its hostname 70 If the server principal matches the constraints of multiple lines 71 in the .k5identity file, the principal from the first matching 78 The following example .k5identity file selects the client principal [all …]
|
| H A D | kdb5_util.man | 67 specifies the name under which the principal database is stored; 82 principal name for the master key in the database. If not 133 Stores the master principal\(aqs keys in a stash file. The \fB\-f\fP 168 causes the name of each principal and policy to be printed as it 173 re\-encrypt principal key data in the dumpfile. The principal keys 242 causes the name of each principal and policy to be printed as it 254 \fBark\fP [\fB\-e\fP \fIenc\fP:\fIsalt\fP,...] \fIprincipal\fP 258 Adds new random keys to \fIprincipal\fP at the next available key version 269 Adds a new master key to the master key principal, but does not mark 290 created principal keys. If no \fItime\fP argument is given, the current [all …]
|
| H A D | kadm5.acl.man | 52 principal permissions [target_principal [restrictions] ] 61 will control access for an actor principal on a target principal. 66 .B \fIprincipal\fP 67 (Partially or fully qualified Kerberos principal name.) Specifies 68 the principal whose permissions are to be set. 75 \fIprincipal\fP matching a particular entry. This is a string of one or 105 [Dis]allows the extraction of principal keys 129 [Dis]allows the propagation of the principal database (used in \fI\%Incremental database propagatio… 135 [Dis]allows the explicit setting of the key for a principal 161 \fBlockdown_keys\fP principal attribute can be used to prevent [all …]
|
| H A D | kinit.man | 56 [\fIprincipal\fP] 60 \fIprincipal\fP\&. If \fIprincipal\fP is absent, kinit chooses an appropriate 61 principal name based on existing credential cache contents or the 63 choice of principal name. 112 requests canonicalization of the principal name, and allows the 113 KDC to reply with a different client principal from the one 117 treats the principal name as an enterprise name. 141 but any principal may be specified. On a KDC, the special keytab 144 administrator to obtain tickets as any principal that supports 153 Then use the \fB\-n\fP option with a principal of the form \fB@REALM\fP [all …]
|
| /freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/ |
| H A D | Principals.htm | 11 …principal is your Kerberos identity. It is your user name plus the Kerberos <a href="JavaScript:po… 18 <li><a href=#single-principal> Using a single principal </a></li> 20 <li><a href=#default-principal> Default principal</a></li> 24 <H2><a name="single-principal">Using a Single Principal</a></H2> 26 If like many users you just have one Kerberos identity, you will have just one principal. 28 …principal in the Get Ticket window it will auto-complete the realm for you. If you select the "Rem… 30 The main window shows your principal, along with information about tickets issued to it. <br> 38 …. For example, administrators often have one principal with standard access and an administrative … 40 …ge Multiple Principals</a> <br> <a href="HTML/Make_Default.htm">How to: Make Default Principal</a> 45 <H2> <a name="default-principal">Default Principal</a></H2> [all …]
|
| H A D | Manage_Multiple_Principals.htm | 13 …er them in the Get Ticket window. Kerberos will then auto-complete your principal as you start to … 14 <li>The Make Default button lets you easily and quickly change the default principal.</li> 19 All of your principals with tickets are listed in the main window. The default principal is in bold… 38 <li><a href=HTML/Make_Default.htm> Set the default principal</a></li> 51 …principal for the first time, enter the principal in the Principal field of the Get Ticket window.… 54 <th id="th2">Select principal before using buttons</th> 56 Select a principal in the main window by clicking it. The selected principal will now be affected b… 62 …wed automatically. To renew tickets just for some principals, click the principal(s) with tickets … 65 <th id="th2">Choose default principal</th> 67 …principal's tickets are used by default when you access a Kerberized service, select a principal i… [all …]
|
| H A D | Make_Default.htm | 9 <H1> Make Default Principal </H1> 11 …principal is the one whose tickets are used when an application or service asks for tickets withou… 13 If you have only one principal, that principal is automatically the default.</p> 15 <H3>Set Default Principal</H3> 17 <li>Select the principal by clicking it in the main window (if the principal is not listed, first g… 21 The default principal appears in bold font in the main window.</p>
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | t_ref_kerb.out | 1 parsed (and unparsed) principal(tytso): 'tytso@ATHENA.MIT.EDU' 2 parsed (and unparsed) principal(tytso@SHAZAAM): MATCH 3 parsed (and unparsed) principal(tytso/root@VEGGIE.COM): MATCH 4 parsed (and unparsed) principal(tytso/tuber/carrot@VEGGIE.COM): MATCH 5 parsed (and unparsed) principal(tytso/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/p/q/r/s/t): 'tytso/a/b/c/d/e/f/… 6 parsed (and unparsed) principal(tytso/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/p/q/r/s/t@FOO): MATCH 7 parsed (and unparsed) principal(tytso\\0/\0@B\n\t\\GAG): MATCH 8 parsed (and unparsed) principal(tytso/\n/\b\t@B\0hacky-test): MATCH 9 parsed (and unparsed) principal(\/slash/\@atsign/octa\/thorpe@\/slash\@at\/sign): MATCH 10 name_type principal(host/www.krb5.test@KRB5.TEST): 1 [all …]
|
| H A D | unparse.c | 30 * Rewritten by Theodore Ts'o to properly unparse principal names 40 * converts the multi-part principal format used in the protocols to a 52 * KRB_PARSE_MALFORMED principal is invalid (does not contain 137 k5_unparse_name(krb5_context context, krb5_const_principal principal, in k5_unparse_name() argument 146 if (!principal || !name) in k5_unparse_name() 159 if (krb5_realm_compare(context, &p, principal)) in k5_unparse_name() 164 totalsize += component_length_quoted(&principal->realm, flags); in k5_unparse_name() 168 for (i = 0; i < principal->length; i++) { in k5_unparse_name() 169 totalsize += component_length_quoted(&principal->data[i], flags); in k5_unparse_name() 172 if (principal->length == 0) in k5_unparse_name() [all …]
|
| /freebsd/contrib/pam-krb5/module/ |
| H A D | alt-auth.c | 4 * pam-krb5 supports a feature where the principal for authentication can be 33 * Map the user to a Kerberos principal according to alt_auth_map. Returns 0 34 * on success, storing the mapped principal name in newly allocated memory in 35 * principal. The caller is responsible for freeing. Returns an errno value 40 char **principal) in pamk5_map_principal() argument 69 /* Now, allocate a string and build the principal. */ in pamk5_map_principal() 82 *principal = malloc(needed); in pamk5_map_principal() 83 if (*principal == NULL) in pamk5_map_principal() 88 memcpy(*principal + offset, user, strlen(user)); in pamk5_map_principal() 92 (*principal)[offset] = *p; in pamk5_map_principal() [all …]
|
| /freebsd/crypto/heimdal/admin/ |
| H A D | ktutil.8 | 63 .It add Oo Fl p Ar principal Oc Oo Fl Fl principal= Ns Ar principal Oc \ 70 principal to add; if what you really want is to add a new principal to 87 .It get Oo Fl p Ar admin principal Oc \ 88 Oo Fl Fl principal= Ns Ar admin principal Oc Oo Fl e Ar enctype Oc \ 92 Oo Fl Fl server-port= Ns Ar server port Oc Ar principal ... 94 .Ar principal , 101 principal. 104 .It remove Oo Fl p Ar principal Oc Oo Fl Fl principal= Ns Ar principal Oc \ 112 .It rename Ar from-principal Ar to-principal 114 .Ar from-principal [all …]
|
| /freebsd/lib/librpcsec_gss/ |
| H A D | rpc_gss_get_principal_name.3 | 30 .Nd "Get a principal name" 37 .Fa "rpc_gss_principal_t *principal" 44 This function can be used to generate a client principal name from 47 .Bl -tag -width ".It principal" 48 .It principal 49 If the principal is created successfully, 50 .Fa *principal 51 will be set to point at the new principal in GSS-API exported name form 53 The name of the mechanism for this principal 55 The name part of the principal [all …]
|
| /freebsd/crypto/heimdal/kadmin/ |
| H A D | kadmin.8 | 43 .Op Fl p Ar string \*(Ba Fl Fl principal= Ns Ar string 66 .It Fl p Ar string , Fl Fl principal= Ns Ar string 67 principal to authenticate as 69 keytab for authentication principal 113 .Ar principal... 115 Adds a new principal to the database. The options not passed on the 121 .Ar principal enctypes... 124 Adds a new encryption type to the principal, only random key are 129 .Ar principal... 131 Removes a principal. [all …]
|
| H A D | kadmin-commands.in | 146 help = "principal's password" 169 help = "principal attributes" 175 help = "principal expiration time" 188 argument = "principal..." 190 help = "Adds a principal to the database." 219 argument = "principal..." 228 argument = "principal..." 234 argument = "principal enctype..." 236 help = "Delete all the mentioned enctypes for principal." 246 argument = "principal enctype..." [all …]
|
| H A D | cpw.c | 45 set_random_key (krb5_principal principal) in set_random_key() argument 52 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys); in set_random_key() 62 set_random_password (krb5_principal principal) in set_random_password() argument 68 ret = kadm5_chpass_principal(kadm_handle, principal, pw); in set_random_password() 72 krb5_unparse_name(context, principal, &princ_name); in set_random_password() 82 set_password (krb5_principal principal, char *password) in set_password() argument 91 krb5_unparse_name(context, principal, &princ_name); in set_password() 102 ret = kadm5_chpass_principal(kadm_handle, principal, password); in set_password() 108 set_key_data (krb5_principal principal, krb5_key_data *key_data) in set_key_data() argument 112 ret = kadm5_chpass_principal_with_key (kadm_handle, principal, in set_key_data() [all …]
|
| /freebsd/contrib/pam-krb5/tests/config/ |
| H A D | README | 8 A keytab for a principal (in the same realm as the test principal 10 that test principal. For an MIT Kerberos KDC, it needs "mci" 11 permissions in kadm5.acl for that principal. For a Heimdal KDC, it 14 modification of a principal will be skipped. 29 An optional keytab for a principal, which generally should be in the 36 fully-qualified principal (including the realm) of a Kerberos 37 principal to use for testing authentication. The second line is the 38 password for that principal. 40 If the realm of the principal is not configured in either DNS or in 49 authentication for the user listed in the pkinit-principal file. [all …]
|
| /freebsd/crypto/heimdal/doc/doxyout/krb5/html/ |
| H A D | group__krb5__principal.html | 3 <title>HeimdalKerberos5library: Heimdal Kerberos 5 principal functions</title> 23 <h1>Heimdal Kerberos 5 principal functions</h1><table border="0" cellpadding="0" cellspacing="0"> 30 …0313">krb5_principal_set_type</a> (krb5_context context, krb5_principal principal, int type)</td><… 32 …e67b7">krb5_principal_get_type</a> (krb5_context context, krb5_const_principal principal)</td></tr> 35 …6362">krb5_principal_get_realm</a> (krb5_context context, krb5_const_principal principal)</td></tr> 38 …c">krb5_principal_get_num_comp</a> (krb5_context context, krb5_const_principal principal)</td></tr> 41 …_flags</a> (krb5_context context, const char *name, int flags, krb5_principal *principal)</td></tr> 44 …">krb5_parse_name</a> (krb5_context context, const char *name, krb5_principal *principal)</td></tr> 47 …krb5_unparse_name_fixed</a> (krb5_context context, krb5_const_principal principal, char *name, siz… 50 …nparse_name_fixed_short</a> (krb5_context context, krb5_const_principal principal, char *name, siz… [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/keytab/ |
| H A D | t_keytab.c | 126 /* Try to lookup unknown principal - when keytab does not exist*/ in kt_test() 128 CHECK(kret, "parsing principal"); in kt_test() 143 * Add the following for this principal in kt_test() 150 kent.principal = princ; in kt_test() 216 /* Try to lookup unknown principal - now that keytab exists*/ in kt_test() 218 CHECK(kret, "parsing principal"); in kt_test() 226 /* Try to lookup known principal */ in kt_test() 228 CHECK(kret, "parsing principal"); in kt_test() 231 CHECK(kret, "looking up principal"); in kt_test() 234 if (!krb5_principal_compare(context, princ, kent.principal) || in kt_test() [all …]
|
| /freebsd/crypto/heimdal/lib/gssapi/krb5/ |
| H A D | acquire_cred.c | 40 krb5_principal principal, in __gsskrb5_ccache_lifetime() argument 48 in_cred.client = principal; in __gsskrb5_ccache_lifetime() 50 realm = krb5_principal_get_realm(context, principal); in __gsskrb5_ccache_lifetime() 131 * If we have a preferred principal, lets try to find it in all in acquire_initiator_cred() 142 if (handle->principal) { in acquire_initiator_cred() 144 handle->principal, in acquire_initiator_cred() 163 } else if (handle->principal == NULL) { in acquire_initiator_cred() 164 kret = krb5_copy_principal(context, def_princ, &handle->principal); in acquire_initiator_cred() 167 } else if (handle->principal != NULL && in acquire_initiator_cred() 168 krb5_principal_compare(context, handle->principal, in acquire_initiator_cred() [all …]
|