/freebsd/crypto/krb5/src/tests/ |
H A D | t_kadmin_acl.py | 114 kadmin_as(none, ['cpw'] + args + ['selected'], expected_code=1, 117 expected_code=1, expected_msg=msg) 120 expected_code=1, expected_msg=msg) 124 expected_code=1, expected_msg=msg) 127 kadmin_as(none, ['cpw'] + args + ['none'], expected_code=1, 136 kadmin_as(none, ['addpol', 'policy'], expected_code=1, 151 kadmin_as(none, ['addprinc'] + args + ['selected'], expected_code=1, 153 kadmin_as(some_add, ['addprinc'] + args + ['unselected'], expected_code=1, 159 expected_code=1, expected_msg='already exists') 168 kadmin_as(none, ['delprinc', 'unselected'], expected_code=1, [all …]
|
H A D | t_kadm5_auth.py | 15 realm.run_kadmin(['addprinc', '-randkey', 'princ'], expected_code=1) 18 'princ'], expected_code=1) 22 realm.run_kadmin(['modprinc', '-maxlife', '3', 'princ'], expected_code=1) 25 expected_code=1) 29 realm.run_kadmin(['setstr', 'princ', 'somekey', 'someval'], expected_code=1) 31 realm.run_kadmin(['setstr', 'princ', 'note', 'abcdefghijkl'], expected_code=1) 35 realm.run_kadmin(['delprinc', 'user'], expected_code=1) 40 realm.run_kadmin(['delprinc', 'deltest'], expected_code=1) 44 realm.run_kadmin(['renprinc', 'princ', 'xyz'], expected_code=1) 46 realm.run_kadmin(['renprinc', 'abcde', 'fghij'], expected_code=1) [all …]
|
H A D | t_policy.py | 10 realm.run([kadminl, 'cpw', '-pw', 'sh0rt', 'pwuser'], expected_code=1, 12 realm.run([kadminl, 'cpw', '-pw', 'longenough', 'pwuser'], expected_code=1, 19 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1, 23 realm.run([kadminl, 'cpw', '-pw', 'l0ngenough', 'pwuser'], expected_code=1, 47 realm.run([kadminl, 'cpw', '-pw', pw, 'histprinc'], expected_code=1, 65 realm.run([kadminl, 'cpw', '-pw', '2222', 'histprinc'], expected_code=1, 67 realm.run([kadminl, 'cpw', '-pw', '1111', 'histprinc'], expected_code=1, 106 realm.run([kadminl, 'cpw', '-pw', 'aa', 'pwuser'], expected_code=1, 108 realm.run([kadminl, 'cpw', '-pw', '3rdpassword', 'pwuser'], expected_code=1, 112 realm.run([kadminl, 'cpw', '-pw', 'aa', 'newuser'], expected_code=1, [all …]
|
H A D | t_ccache.py | 38 out = realm.run([klist, '-c', 'KEYRING:process:abcd'], expected_code=1) 47 realm.run([klist], expected_code=1, expected_msg='No credentials cache found') 52 expected_code=1, expected_msg='Failed to store credentials') 56 realm.run([klist, '-s'], expected_code=1) 60 realm.run([klist, '-s'], expected_code=1) 64 realm.run([klist, '-s'], expected_code=1) 77 realm.run([klist, '-A', '-s'], expected_code=1) 87 output = realm.run([klist], expected_code=1) 90 output = realm.run([klist, '-l'], expected_code=1) 93 realm.run([klist, '-A', '-s'], expected_code=1) [all …]
|
H A D | t_kdb.py | 204 expected_code=1, expected_msg='DN is out of the realm subtree') 210 expected_code=1, expected_msg='DN is out of the realm subtree') 214 expected_code=1, expected_msg='ldap object is already kerberized') 217 expected_code=1, expected_msg='link information can not be set') 222 expected_code=1, expected_msg='DN is out of the realm subtree') 226 expected_code=1, expected_msg='kerberos principal is already linked') 231 expected_code=1, expected_msg='DN is out of the realm subtree') 235 expected_code=1, expected_msg='containerdn option not supported') 239 '-x', 'linkdn=cn=t2,cn=krb5', 'princ4'], expected_code=1, 269 kldaputil(['destroy_policy', '-force', 'tktpol'], expected_code=1) [all …]
|
H A D | t_certauth.py | 25 realm.pkinit('nocert', expected_code=1, expected_msg='Client name mismatch') 34 realm.pkinit('user2', expected_code=1, expected_msg='Certificate mismatch') 41 realm.pkinit(realm.user_princ, expected_code=1, 51 realm.pkinit('user2', expected_code=1, expected_msg='Certificate mismatch') 62 realm.pkinit('user2', expected_code=1, expected_msg='Certificate mismatch') 63 realm.pkinit('nocert', expected_code=1, expected_msg='Client name mismatch')
|
H A D | t_alias.py | 13 realm.run([kadminl, 'getprinc', 'alias'], expected_code=1, 22 realm.run([kadminl, 'alias', 'x', 'y@OTHER.REALM'], expected_code=1, 58 realm.run([kvno, 'a11'], expected_code=1, 63 realm.run([kvno, 'selfalias'], expected_code=1, 67 realm.run([kadminl, 'addprinc', '-nokey', 'alias'], expected_code=1, 69 realm.run([kadminl, 'alias', 'alias', 'canon'], expected_code=1, 71 realm.run([kadminl, 'renprinc', 'user', 'alias'], expected_code=1, 88 realm.run([kadminl, 'renprinc', 'alias', 'nalias'], expected_code=1,
|
H A D | t_proxy.py | 66 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 76 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 86 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 96 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 106 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 141 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 151 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 161 realm.kinit(realm.user_princ, password=password('user'), expected_code=1) 183 realm.kinit(realm.user_princ, password=password('user'), expected_code=1)
|
H A D | t_pkinit.py | 95 expected_code=1, expected_msg=msg) 114 realm.kinit('@%s' % realm.realm, flags=['-n'], expected_code=1, 134 realm.run([kadmin, '-n', 'getprinc', 'testadd'], expected_code=1, 145 realm.run([kvno, realm.host_princ], expected_code=1, 227 expected_code=1, expected_msg='Preauthentication failed') 237 expected_code=2) 282 expected_code=2) 316 expected_code=2) 366 expected_code=1, expected_msg=msg) 381 expected_code=1, expected_msg=msg) [all …]
|
H A D | t_general.py | 7 realm.run([kinit, realm.user_princ], input='wrong\n', expected_code=1, 44 realm.run(['./icred', 'xpr'], expected_code=1, 47 realm.run(['./icred', 'xpr'], expected_code=1, 60 realm.run([kinit, '-C', 'notfoundprinc'], expected_code=1,
|
H A D | t_pwqual.py | 22 realm.run([kadminl, 'addprinc', '-pw', '', 'p1'], expected_code=1, 28 expected_code=1, 34 expected_code=1, 38 realm.run([kadminl, 'addprinc', '-pw', 'birdsoranges', 'p6'], expected_code=1,
|
H A D | t_preauth.py | 13 realm.kinit('nokeyuser', password('user'), expected_code=1, 86 password('user')], expected_code=1, 143 realm.user_princ, password('user')], expected_code=1, 189 realm.user_princ, password('user')], expected_code=1, 247 realm.user_princ, password('user')], expected_code=1,
|
H A D | t_skew.py | 42 realm.kinit(realm.user_princ, password('user'), expected_code=1, 44 realm.kinit(realm.user_princ, None, flags=['-T', fast_cache], expected_code=1, 50 realm.kinit(realm.user_princ, password('user'), expected_code=1, 52 realm.kinit(realm.user_princ, None, flags=['-T', fast_cache], expected_code=1,
|
H A D | t_cve-2013-1416.py | 8 realm.run([kvno, '/test'], expected_code=1) 9 realm.run([kvno, 'test/'], expected_code=1) 10 realm.run([kvno, '/'], expected_code=1)
|
H A D | t_unlockiter.py | 7 realm.run(['./unlockiter'], expected_code=1) 9 realm.run(['./unlockiter', '-l'], expected_code=1) 18 realm.run(['./unlockiter', '-l'], expected_code=1)
|
H A D | t_errmsg.py | 9 out = realm.run([klist, '-c', 'testdir/xx/yy'], env=e1, expected_code=1) 16 out = realm.run([klist, '-c', 'testdir/xx/yy'], env=e2, expected_code=1) 22 out = realm.run([klist, '-c', 'testdir/xx/yy'], env=e3, expected_code=1)
|
H A D | t_referral.py | 29 realm.run(['./gcred', nametype, 'a/x.d@'], expected_code=1, 103 out, trace = realm.run(['./gcred', 'srv-hst', 'a/x.d@'], expected_code=1, 122 r1.kinit('user', expected_code=1, 139 r1.kinit('user', None, ['-C'], env=denv, expected_code=1, expected_trace=msgs,
|
/freebsd/crypto/krb5/src/lib/krb5/krb/ |
H A D | t_vfy_increds.py | 43 realm.run(['./t_vfy_increds'], expected_code=1) 44 realm.run(['./t_vfy_increds', '-n'], expected_code=1) 62 realm.run(['./t_vfy_increds', '-n'], expected_code=1) 74 realm.run(['./t_vfy_increds', '-n'], expected_code=1) 84 realm.run(['./t_vfy_increds', '-n'], expected_code=1) 94 realm.run(['./t_vfy_increds', '-n'], expected_code=1) 95 realm.run(['./t_vfy_increds', realm.nfs_princ], expected_code=1) 96 realm.run(['./t_vfy_increds', '-n', realm.nfs_princ], expected_code=1) 105 realm.run(['./t_vfy_increds'], expected_code=1)
|
/freebsd/crypto/krb5/src/tests/gssapi/ |
H A D | t_bindings.py | 12 expected_code=1, expected_msg='Incorrect channel bindings') 20 expected_code=1, expected_msg='Incorrect channel bindings') 30 expected_code=1, expected_msg='Incorrect channel bindings') 32 expected_code=1, expected_msg='Incorrect channel bindings') 39 expected_code=1, expected_msg='Incorrect channel bindings') 41 expected_code=1, expected_msg='Incorrect channel bindings') 48 expected_code=1, expected_msg='Incorrect channel bindings') 50 expected_code=1, expected_msg='Incorrect channel bindings') 57 expected_code=1, expected_msg='Incorrect channel bindings') 59 expected_code=1, expected_msg='Incorrect channel bindings')
|
H A D | t_credstore.py | 25 expected_code=1, expected_msg='does not match desired name') 27 expected_code=1, expected_msg='does not match desired name') 29 expected_code=1, expected_msg='does not match desired name') 43 expected_code=1, expected_msg='does not match desired name') 45 expected_code=1, expected_msg='does not match desired name') 54 expected_code=1, 63 expected_code=1, expected_msg='An invalid name was supplied') 67 expected_code=1, expected_msg='Credential usage type is unknown') 71 expected_code=1, expected_msg='Credential usage type is unknown') 74 expected_code=1, expected_msg='Credential usage type is unknown') [all …]
|
H A D | t_store_cred.py | 20 realm.run(['./t_store_cred', cc_alice], expected_code=1, 22 realm.run(['./t_store_cred', cc_bob], expected_code=1, 35 realm.run(['./t_store_cred', cc_bob, cc_alternate], expected_code=1, 42 realm.run(['./t_store_cred', '-i', cc_bob, cc_alternate], expected_code=1, 48 realm.run([klist, '-c', cc_dir], expected_code=1, 51 realm.run(['./t_store_cred', cc_alice, cc_dir], expected_code=1, 54 realm.run([klist, '-c', cc_dir], expected_code=1,
|
H A D | t_negoex.py | 78 test({'KEY': 'never'}, expected_code=1, expected_msg='No NegoEx verify key') 111 test({'HOPS': '1', 'INIT_EXCHANGE_FAIL': '102'}, expected_code=1, 115 expected_code=1, 118 test({'HOPS': '2', 'INIT_EXCHANGE_FAIL': '102'}, expected_code=1, 127 test({'HOPS': '2', 'ACCEPT_FAIL': '102'}, expected_code=1,
|
H A D | t_s4u.py | 37 pservice1, pservice2], expected_code=1) 45 expected_code=1) 53 pservice1, pservice2], expected_code=1) 60 realm.run(['./t_s4u', puser, pservice2], expected_code=1, 62 realm.run(['./t_s4u', '--spnego', puser, pservice2], expected_code=1, 68 realm.run(['./t_s4u', puser, pservice2], expected_code=1, 75 realm.run(['./t_s4u', '--spnego', puser, pservice2], expected_code=1, 369 ra.run(['./t_s4u', 'p:' + 'sensitive@A', 'h:service@rb.a'], expected_code=1) 378 ra.run(['./t_s4u', 'p:' + 'sensitive@A', 'h:service@rb.b'], expected_code=1) 387 ra.run(['./t_s4u', 'p:' + 'sensitive@A', 'h:service@rb.c'], expected_code=1) [all …]
|
H A D | t_gssapi.py | 35 'h:host'], env=no_default, expected_code=1, 78 realm.run(['./t_accname', 'p:service2/dwight'], expected_code=1, 86 realm.run(['./t_accname', 'p:service1/andrew', 'h:service2'], expected_code=1, 90 realm.run(['./t_accname', 'p:service2/calvin', 'h:service1'], expected_code=1, 102 'h:host@%s' % socket.gethostname()], expected_code=1, 125 realm.run(['./t_imp_cred', 'p:service2/dwight'], expected_code=1, 130 out = realm.run(['./t_accname', 'p:abc'], expected_code=1)
|
/freebsd/crypto/krb5/src/clients/ksu/ |
H A D | t_ksu.py | 131 realm.run([ksu, 'ksutest', '-n', 'alice', '-a', '-c', klist], expected_code=1, 138 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1, 143 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1, 149 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1, 161 realm.run([ksu, 'ksutest', '-a', '-c', klist], expected_code=1, 169 realm.run([ksu, 'ksutest', '-e', klist], expected_code=1, 172 realm.run([ksu, 'ksutest', '-a', '-c', klist], expected_code=1, 184 realm.run([ksu, 'ksutest', '-a', '-c', klist], expected_code=1, 188 realm.run([ksu, 'ksutest', '-e', kvno], expected_code=1, 190 realm.run([ksu, 'ksutest', '-e', 'doesnotexist'], expected_code=1, [all …]
|