| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | get_host_realm.c | 53 krb5_realm **realms) in copy_txt_to_realms() argument 65 *realms = malloc ((n + 1) * sizeof(krb5_realm)); in copy_txt_to_realms() 66 if (*realms == NULL) in copy_txt_to_realms() 70 (*realms)[i] = NULL; in copy_txt_to_realms() 79 free ((*realms)[i]); in copy_txt_to_realms() 80 free (*realms); in copy_txt_to_realms() 83 (*realms)[i] = tmp; in copy_txt_to_realms() 93 krb5_realm **realms) in dns_find_realm() argument 119 ret = copy_txt_to_realms (r->head, realms); in dns_find_realm() 134 * Try to figure out what realms host in `domain' belong to from the [all …]
|
| H A D | transited.c | 132 struct tr_realm *realms, const char *client_realm, in make_paths() argument 139 for(r = realms; r; r = r->next){ in make_paths() 152 free_realms(realms); in make_paths() 163 struct tr_realm *realms, const char *client_realm) in expand_realms() argument 167 for(r = realms; r; r = r->next){ in expand_realms() 179 free_realms(realms); in expand_realms() 192 free_realms(realms); in expand_realms() 257 const char *tr, int length, struct tr_realm **realms) in decode_realms() argument 283 free_realms(*realms); in decode_realms() 284 *realms = NULL; in decode_realms() [all …]
|
| H A D | expand_hostname.c | 108 char ***realms) in vanilla_hostname() argument 117 ret = krb5_get_host_realm (context, *new_hostname, realms); in vanilla_hostname() 128 * and return the realms new_hostname is believed to belong to in 129 * realms. 135 * @param realms output possible realms, is an array that is terminated 147 char ***realms) in krb5_expand_hostname_realms() argument 155 realms); in krb5_expand_hostname_realms() 163 realms); in krb5_expand_hostname_realms() 173 ret = krb5_get_host_realm (context, *new_hostname, realms); in krb5_expand_hostname_realms() 182 return vanilla_hostname (context, orig_hostname, new_hostname, realms); in krb5_expand_hostname_realms()
|
| H A D | krb5_check_transited.3 | 52 .Fa "krb5_realm *realms" 59 .Fa "const char *const *realms" 67 .Fa "char ***realms" 74 .Fa "char **realms" 85 .Fa realms 88 is the realms between them. 103 uses to describe the transited realms in krbtgts.
|
| H A D | set_default_realm.c | 73 krb5_realm *realms = NULL; in krb5_set_default_realm() local 76 realms = krb5_config_get_strings (context, NULL, in krb5_set_default_realm() 80 if (realms == NULL) in krb5_set_default_realm() 81 ret = krb5_get_host_realm(context, NULL, &realms); in krb5_set_default_realm() 83 ret = string_to_list (context, realm, &realms); in krb5_set_default_realm() 88 context->default_realms = realms; in krb5_set_default_realm()
|
| H A D | krb5_set_default_realm.3 | 74 .Fa "krb5_realm **realms" 83 copies the list of realms from 103 terminated list of default realms for this context. 104 Realms returned by 112 terminated list of realms for
|
| H A D | mk_req.c | 91 char **realms; in krb5_mk_req() local 96 &real_hostname, &realms); in krb5_mk_req() 101 strlen(*realms), in krb5_mk_req() 102 *realms, in krb5_mk_req() 107 krb5_free_host_realm (context, realms); in krb5_mk_req()
|
| H A D | get_default_realm.c | 37 * Return a NULL-terminated list of default realms in `realms'. 43 krb5_realm **realms) in krb5_get_default_realms() argument 53 realms); in krb5_get_default_realms()
|
| H A D | verify_user.c | 193 krb5_realm *realms, *r; in krb5_verify_user_opt() local 194 ret = krb5_get_default_realms (context, &realms); in krb5_verify_user_opt() 199 for (r = realms; *r != NULL && ret != 0; ++r) { in krb5_verify_user_opt() 202 krb5_free_host_realm (context, realms); in krb5_verify_user_opt() 208 krb5_free_host_realm (context, realms); in krb5_verify_user_opt() 239 * ignored and all the local realms are tried.
|
| H A D | copy_host_realm.c | 37 * Copy the list of realms from `from' to `to'. 40 * @param from list of realms to copy from. 41 * @param to list of realms to copy to, free list of krb5_free_host_realm().
|
| /freebsd/crypto/krb5/src/lib/krb5/os/ |
| H A D | hostrealm.c | 345 char **realms; in k5_make_realmlist() local 348 realms = calloc(2, sizeof(*realms)); in k5_make_realmlist() 349 if (realms == NULL) in k5_make_realmlist() 351 realms[0] = strdup(realm); in k5_make_realmlist() 352 if (realms[0] == NULL) { in k5_make_realmlist() 353 free(realms); in k5_make_realmlist() 356 *realms_out = realms; in k5_make_realmlist() 365 char **realms, *cleanname = NULL; in krb5_get_host_realm() local 379 /* Give each module a chance to determine the host's realms. */ in krb5_get_host_realm() 381 ret = host_realm(context, *hp, cleanname, &realms); in krb5_get_host_realm() [all …]
|
| H A D | t_std_conf.c | 129 char **realms, **cpp; in test_get_host_realm() local 132 retval = krb5_get_host_realm(ctx, host, &realms); in test_get_host_realm() 138 if (realms == 0) { in test_get_host_realm() 142 if (realms[0] == 0) { in test_get_host_realm() 144 free(realms); in test_get_host_realm() 147 for (cpp = realms; *cpp; cpp++) { in test_get_host_realm() 151 free(realms); in test_get_host_realm()
|
| /freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/ |
| H A D | Kerberos_Terminology.htm | 10 … using Kerberos; <a href="#principal"> principals</a>, <a href="#realm"> realms</a>, and <a href="… 23 Or if a particular installation uses multiple realms and requires a 24 separate log-on for each one, people with access to multiple realms 34 <th> <a name="realm"> Realms</a> </th> 38 Kerberos <i>realms</i> are a way of logically grouping 41 controlled by Kerberos. In Windows, realms are called <em>domains.</em> 44 group identities and network resources into realms. For example, some 47 resources grouped in other realms. Depending on your installation and 51 different realms. 52 <p></p>Realms are usually named after the DNS domain they correspond
|
| H A D | Glossary.htm | 15 <dd> In Windows, realms are called domains. <br><a href="HTML/Kerberos_Terminology.htm#realm">Abou… 46 …realms are a way of logically grouping resources and identities that use Kerberos. Your realm is t… 47 <br><a href="HTML/Kerberos_Terminology.htm#realm">About: Kerberos Terminology (Realms)</a>
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | walk_rtree.c | 72 krb5_data **realms, 78 krb5_data *realms, 179 * an authentication path between realms." The database is contained 352 krb5_data *realms; in rtree_hier_tree() local 359 &realms, &nrealms, sep); in rtree_hier_tree() 372 dstrealm = &realms[i]; in rtree_hier_tree() 378 free_realmlist(context, realms, nrealms); in rtree_hier_tree() 385 free_realmlist(context, realms, nrealms); in rtree_hier_tree() 391 * Construct list of realms between client and server. 397 krb5_data **realms, in rtree_hier_realms() argument [all …]
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | t_sockact.py | 7 kdc_conf = {'realms': {'$realm': { 19 cconf1 = {'realms': {'$realm': {'kdc': '$testdir/sock1'}}} 24 cconf2 = {'realms': {'$realm': {'kdc': '$hostname:$port8'}}} 32 cconf3 = {'realms': {'$realm': {'kdc': '$testdir/sock2'}}} 38 cconf4 = {'realms': {'$realm': {'kdc': '$hostname:$port7'}}}
|
| /freebsd/crypto/krb5/src/include/krb5/ |
| H A D | hostrealm_plugin.h | 77 * Optional: Determine the possible realms of a hostname, using only secure, 80 * null-terminated list of realms in *realms_out, KRB5_PLUGIN_NO_HANDLE to 89 * Optional: Determine the possible realms of a hostname, using heuristic or 92 * of realms in *realms_out, KRB5_PLUGIN_NO_HANDLE to defer to later modules, 101 * Optional: Determine the possible default realms of the local host. Return 102 * success with a null-terminated list of realms in *realms_out,
|
| /freebsd/crypto/krb5/src/util/profile/ |
| H A D | profile.5 | 25 [realms] 40 "libdefaults" and "realms". The libdefaults section has a single 42 "ATHENA.MIT.EDU". The realms section has two child sections, 66 [realms]
|
| /freebsd/crypto/heimdal/doc/ |
| H A D | setup.texi | 79 responses. The @samp{realms} section contains information about specific 80 realms, such as where they hide their KDC@. This section serves the same 83 mappings from domains to realms, equivalent to the Kerberos 4 84 @file{krb.realms} file. 92 [realms] 107 @samp{kerberos.my.realm}, you can omit the @samp{realms} section too. 179 me@@MY.REALMS's Password: 370 [realms] 567 useful when you have multiple realms to distribute from one server. 739 It is possible to share keys between two realms that trust each [all …]
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | announce.c | 238 /* skip registering LKDC realms */ in register_srv() 315 char **realms, **r; in register_srv_realms() local 320 ret = (announce_config->db[i]->hdb_get_realms)(announce_context, &realms); in register_srv_realms() 322 for (r = realms; r && *r; r++) in register_srv_realms() 324 krb5_free_host_realm(announce_context, realms); in register_srv_realms() 449 char **realms, **r; in update_all() local 454 ret = (announce_config->db[i]->hdb_get_realms)(announce_context, announce_config->db[i], &realms); in update_all() 456 for (r = realms; r && *r; r++) in update_all() 458 krb5_free_host_realm(announce_context, realms); in update_all()
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | krb5kdc.man | 55 to serve multiple realms. If no \fB\-r\fP option is given, the default 103 The KDC may service requests for multiple realms (maximum 32 realms). 104 The realms are listed on the command line. Per\-realm options that can
|
| H A D | krb5.conf.man | 37 realms of interest, defaults for the current realm and for Kerberos 38 applications, and mappings of hostnames onto Kerberos realms. 140 \fI\%[realms]\fP 148 Maps server hostnames to Kerberos realms 443 Kerberos realms is used to determine whether a domain is a valid 520 .SS [realms] 522 Each tag in the [realms] section of the file is the name of a Kerberos 685 Kerberos realms. Each tag is a domain name, providing the mapping for 688 identified either in the \fI\%realms\fP section or using DNS SRV records. 721 authentication paths between realms. [all …]
|
| /freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | ldap_realm.c | 69 * list realms from eDirectory 113 * Lists the realms in the Directory. 117 krb5_ldap_list_realm(krb5_context context, char ***realms) in krb5_ldap_list_realm() argument 149 *realms = NULL; in krb5_ldap_list_realm() 158 *realms = calloc((unsigned int) count+1, sizeof (char *)); in krb5_ldap_list_realm() 159 CHECK_NULL(*realms); in krb5_ldap_list_realm() 166 (*realms)[count] = strdup(values[0]); in krb5_ldap_list_realm() 167 CHECK_NULL((*realms)[count]); in krb5_ldap_list_realm() 178 if (*realms) { in krb5_ldap_list_realm() 179 for (i=0; (*realms)[i] != NULL; ++i) { in krb5_ldap_list_realm() [all …]
|
| /freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/ |
| H A D | krb5_support.3 | 76 …e_realms\fP (krb5_context context, const char *orig_hostname, char **new_hostname, char ***realms)" 563 …e_realms (krb5_context context, const char * orig_hostname, char ** new_hostname, char *** realms)" 565 …y allocated space in new_hostname and return the realms new_hostname is believed to belong to in r… 575 \fIrealms\fP output possible realms, is an array that is terminated with NULL. Caller must free wit… 613 If no configuration file exists, match user against local domains, ie luser@LOCAL-REALMS-IN-CONFIGU…
|
| /freebsd/crypto/krb5/src/include/ |
| H A D | win-mac.h | 170 #define INI_KRB_REALMS "krb.realms" /* Location of krb.realms file */ 171 #define DEF_KRB_REALMS "krb.realms" /* Default name for krb.realms file */
|