Home
last modified time | relevance | path

Searched full:realms (Results 1 – 25 of 159) sorted by relevance

1234567

/freebsd/crypto/heimdal/lib/krb5/
H A Dget_host_realm.c53 krb5_realm **realms) in copy_txt_to_realms() argument
65 *realms = malloc ((n + 1) * sizeof(krb5_realm)); in copy_txt_to_realms()
66 if (*realms == NULL) in copy_txt_to_realms()
70 (*realms)[i] = NULL; in copy_txt_to_realms()
79 free ((*realms)[i]); in copy_txt_to_realms()
80 free (*realms); in copy_txt_to_realms()
83 (*realms)[i] = tmp; in copy_txt_to_realms()
93 krb5_realm **realms) in dns_find_realm() argument
119 ret = copy_txt_to_realms (r->head, realms); in dns_find_realm()
134 * Try to figure out what realms host in `domain' belong to from the
[all …]
H A Dtransited.c132 struct tr_realm *realms, const char *client_realm, in make_paths() argument
139 for(r = realms; r; r = r->next){ in make_paths()
152 free_realms(realms); in make_paths()
163 struct tr_realm *realms, const char *client_realm) in expand_realms() argument
167 for(r = realms; r; r = r->next){ in expand_realms()
179 free_realms(realms); in expand_realms()
192 free_realms(realms); in expand_realms()
257 const char *tr, int length, struct tr_realm **realms) in decode_realms() argument
283 free_realms(*realms); in decode_realms()
284 *realms = NULL; in decode_realms()
[all …]
H A Dexpand_hostname.c108 char ***realms) in vanilla_hostname() argument
117 ret = krb5_get_host_realm (context, *new_hostname, realms); in vanilla_hostname()
128 * and return the realms new_hostname is believed to belong to in
129 * realms.
135 * @param realms output possible realms, is an array that is terminated
147 char ***realms) in krb5_expand_hostname_realms() argument
155 realms); in krb5_expand_hostname_realms()
163 realms); in krb5_expand_hostname_realms()
173 ret = krb5_get_host_realm (context, *new_hostname, realms); in krb5_expand_hostname_realms()
182 return vanilla_hostname (context, orig_hostname, new_hostname, realms); in krb5_expand_hostname_realms()
H A Dkrb5_check_transited.352 .Fa "krb5_realm *realms"
59 .Fa "const char *const *realms"
67 .Fa "char ***realms"
74 .Fa "char **realms"
85 .Fa realms
88 is the realms between them.
103 uses to describe the transited realms in krbtgts.
H A Dset_default_realm.c73 krb5_realm *realms = NULL; in krb5_set_default_realm() local
76 realms = krb5_config_get_strings (context, NULL, in krb5_set_default_realm()
80 if (realms == NULL) in krb5_set_default_realm()
81 ret = krb5_get_host_realm(context, NULL, &realms); in krb5_set_default_realm()
83 ret = string_to_list (context, realm, &realms); in krb5_set_default_realm()
88 context->default_realms = realms; in krb5_set_default_realm()
H A Dkrb5_set_default_realm.374 .Fa "krb5_realm **realms"
83 copies the list of realms from
103 terminated list of default realms for this context.
104 Realms returned by
112 terminated list of realms for
H A Dmk_req.c91 char **realms; in krb5_mk_req() local
96 &real_hostname, &realms); in krb5_mk_req()
101 strlen(*realms), in krb5_mk_req()
102 *realms, in krb5_mk_req()
107 krb5_free_host_realm (context, realms); in krb5_mk_req()
H A Dget_default_realm.c37 * Return a NULL-terminated list of default realms in `realms'.
43 krb5_realm **realms) in krb5_get_default_realms() argument
53 realms); in krb5_get_default_realms()
H A Dverify_user.c193 krb5_realm *realms, *r; in krb5_verify_user_opt() local
194 ret = krb5_get_default_realms (context, &realms); in krb5_verify_user_opt()
199 for (r = realms; *r != NULL && ret != 0; ++r) { in krb5_verify_user_opt()
202 krb5_free_host_realm (context, realms); in krb5_verify_user_opt()
208 krb5_free_host_realm (context, realms); in krb5_verify_user_opt()
239 * ignored and all the local realms are tried.
H A Dcopy_host_realm.c37 * Copy the list of realms from `from' to `to'.
40 * @param from list of realms to copy from.
41 * @param to list of realms to copy to, free list of krb5_free_host_realm().
/freebsd/crypto/krb5/src/lib/krb5/os/
H A Dhostrealm.c345 char **realms; in k5_make_realmlist() local
348 realms = calloc(2, sizeof(*realms)); in k5_make_realmlist()
349 if (realms == NULL) in k5_make_realmlist()
351 realms[0] = strdup(realm); in k5_make_realmlist()
352 if (realms[0] == NULL) { in k5_make_realmlist()
353 free(realms); in k5_make_realmlist()
356 *realms_out = realms; in k5_make_realmlist()
365 char **realms, *cleanname = NULL; in krb5_get_host_realm() local
379 /* Give each module a chance to determine the host's realms. */ in krb5_get_host_realm()
381 ret = host_realm(context, *hp, cleanname, &realms); in krb5_get_host_realm()
[all …]
H A Dt_std_conf.c129 char **realms, **cpp; in test_get_host_realm() local
132 retval = krb5_get_host_realm(ctx, host, &realms); in test_get_host_realm()
138 if (realms == 0) { in test_get_host_realm()
142 if (realms[0] == 0) { in test_get_host_realm()
144 free(realms); in test_get_host_realm()
147 for (cpp = realms; *cpp; cpp++) { in test_get_host_realm()
151 free(realms); in test_get_host_realm()
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/
H A DKerberos_Terminology.htm10 … using Kerberos; <a href="#principal"> principals</a>, <a href="#realm"> realms</a>, and <a href="…
23 Or if a particular installation uses multiple realms and requires a
24 separate log-on for each one, people with access to multiple realms
34 <th> <a name="realm"> Realms</a> </th>
38 Kerberos <i>realms</i> are a way of logically grouping
41 controlled by Kerberos. In Windows, realms are called <em>domains.</em>
44 group identities and network resources into realms. For example, some
47 resources grouped in other realms. Depending on your installation and
51 different realms.
52 <p></p>Realms are usually named after the DNS domain they correspond
H A DGlossary.htm15 <dd> In Windows, realms are called domains. <br><a href="HTML/Kerberos_Terminology.htm#realm">Abou…
46realms are a way of logically grouping resources and identities that use Kerberos. Your realm is t…
47 <br><a href="HTML/Kerberos_Terminology.htm#realm">About: Kerberos Terminology (Realms)</a>
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dwalk_rtree.c72 krb5_data **realms,
78 krb5_data *realms,
179 * an authentication path between realms." The database is contained
352 krb5_data *realms; in rtree_hier_tree() local
359 &realms, &nrealms, sep); in rtree_hier_tree()
372 dstrealm = &realms[i]; in rtree_hier_tree()
378 free_realmlist(context, realms, nrealms); in rtree_hier_tree()
385 free_realmlist(context, realms, nrealms); in rtree_hier_tree()
391 * Construct list of realms between client and server.
397 krb5_data **realms, in rtree_hier_realms() argument
[all …]
/freebsd/crypto/krb5/src/kdc/
H A Dt_sockact.py7 kdc_conf = {'realms': {'$realm': {
19 cconf1 = {'realms': {'$realm': {'kdc': '$testdir/sock1'}}}
24 cconf2 = {'realms': {'$realm': {'kdc': '$hostname:$port8'}}}
32 cconf3 = {'realms': {'$realm': {'kdc': '$testdir/sock2'}}}
38 cconf4 = {'realms': {'$realm': {'kdc': '$hostname:$port7'}}}
/freebsd/crypto/krb5/src/include/krb5/
H A Dhostrealm_plugin.h77 * Optional: Determine the possible realms of a hostname, using only secure,
80 * null-terminated list of realms in *realms_out, KRB5_PLUGIN_NO_HANDLE to
89 * Optional: Determine the possible realms of a hostname, using heuristic or
92 * of realms in *realms_out, KRB5_PLUGIN_NO_HANDLE to defer to later modules,
101 * Optional: Determine the possible default realms of the local host. Return
102 * success with a null-terminated list of realms in *realms_out,
/freebsd/crypto/krb5/src/util/profile/
H A Dprofile.525 [realms]
40 "libdefaults" and "realms". The libdefaults section has a single
42 "ATHENA.MIT.EDU". The realms section has two child sections,
66 [realms]
/freebsd/crypto/heimdal/doc/
H A Dsetup.texi79 responses. The @samp{realms} section contains information about specific
80 realms, such as where they hide their KDC@. This section serves the same
83 mappings from domains to realms, equivalent to the Kerberos 4
84 @file{krb.realms} file.
92 [realms]
107 @samp{kerberos.my.realm}, you can omit the @samp{realms} section too.
179 me@@MY.REALMS's Password:
370 [realms]
567 useful when you have multiple realms to distribute from one server.
739 It is possible to share keys between two realms that trust each
[all …]
/freebsd/crypto/heimdal/kdc/
H A Dannounce.c238 /* skip registering LKDC realms */ in register_srv()
315 char **realms, **r; in register_srv_realms() local
320 ret = (announce_config->db[i]->hdb_get_realms)(announce_context, &realms); in register_srv_realms()
322 for (r = realms; r && *r; r++) in register_srv_realms()
324 krb5_free_host_realm(announce_context, realms); in register_srv_realms()
449 char **realms, **r; in update_all() local
454 ret = (announce_config->db[i]->hdb_get_realms)(announce_context, announce_config->db[i], &realms); in update_all()
456 for (r = realms; r && *r; r++) in update_all()
458 krb5_free_host_realm(announce_context, realms); in update_all()
/freebsd/crypto/krb5/src/man/
H A Dkrb5kdc.man55 to serve multiple realms. If no \fB\-r\fP option is given, the default
103 The KDC may service requests for multiple realms (maximum 32 realms).
104 The realms are listed on the command line. Per\-realm options that can
H A Dkrb5.conf.man37 realms of interest, defaults for the current realm and for Kerberos
38 applications, and mappings of hostnames onto Kerberos realms.
140 \fI\%[realms]\fP
148 Maps server hostnames to Kerberos realms
443 Kerberos realms is used to determine whether a domain is a valid
520 .SS [realms]
522 Each tag in the [realms] section of the file is the name of a Kerberos
685 Kerberos realms. Each tag is a domain name, providing the mapping for
688 identified either in the \fI\%realms\fP section or using DNS SRV records.
721 authentication paths between realms.
[all …]
/freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_realm.c69 * list realms from eDirectory
113 * Lists the realms in the Directory.
117 krb5_ldap_list_realm(krb5_context context, char ***realms) in krb5_ldap_list_realm() argument
149 *realms = NULL; in krb5_ldap_list_realm()
158 *realms = calloc((unsigned int) count+1, sizeof (char *)); in krb5_ldap_list_realm()
159 CHECK_NULL(*realms); in krb5_ldap_list_realm()
166 (*realms)[count] = strdup(values[0]); in krb5_ldap_list_realm()
167 CHECK_NULL((*realms)[count]); in krb5_ldap_list_realm()
178 if (*realms) { in krb5_ldap_list_realm()
179 for (i=0; (*realms)[i] != NULL; ++i) { in krb5_ldap_list_realm()
[all …]
/freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/
H A Dkrb5_support.376 …e_realms\fP (krb5_context context, const char *orig_hostname, char **new_hostname, char ***realms)"
563 …e_realms (krb5_context context, const char * orig_hostname, char ** new_hostname, char *** realms)"
565 …y allocated space in new_hostname and return the realms new_hostname is believed to belong to in r…
575 \fIrealms\fP output possible realms, is an array that is terminated with NULL. Caller must free wit…
613 If no configuration file exists, match user against local domains, ie luser@LOCAL-REALMS-IN-CONFIGU…
/freebsd/crypto/krb5/src/include/
H A Dwin-mac.h170 #define INI_KRB_REALMS "krb.realms" /* Location of krb.realms file */
171 #define DEF_KRB_REALMS "krb.realms" /* Default name for krb.realms file */

1234567