| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | principal.c | 103 krb5_principal principal, in krb5_principal_set_type() argument 106 princ_type(principal) = type; in krb5_principal_set_type() 122 krb5_const_principal principal) in krb5_principal_get_type() argument 124 return princ_type(principal); in krb5_principal_get_type() 140 krb5_const_principal principal) in krb5_principal_get_realm() argument 142 return princ_realm(principal); in krb5_principal_get_realm() 147 krb5_const_principal principal, in krb5_principal_get_comp_string() argument 150 if(component >= princ_num_comp(principal)) in krb5_principal_get_comp_string() 152 return princ_ncomp(principal, component); in krb5_principal_get_comp_string() 168 krb5_const_principal principal) in krb5_principal_get_num_comp() argument [all …]
|
| H A D | verify_user.c | 38 krb5_principal principal, in verify_common() argument 72 ret = krb5_cc_initialize(context, id, principal); in verify_common() 150 krb5_principal principal, in verify_user_opt_int() argument 163 krb5_principal_get_realm(context, principal), in verify_user_opt_int() 167 principal, in verify_user_opt_int() 178 return verify_common (context, principal, OPT(ccache, NULL), in verify_user_opt_int() 186 krb5_principal principal, in krb5_verify_user_opt() argument 200 ret = krb5_principal_set_realm(context, principal, *r); in krb5_verify_user_opt() 206 ret = verify_user_opt_int(context, principal, password, opt); in krb5_verify_user_opt() 212 ret = verify_user_opt_int(context, principal, password, opt); in krb5_verify_user_opt() [all …]
|
| H A D | kuserok.c | 46 krb5_principal principal, in check_one_file() argument 97 *result = krb5_principal_compare (context, principal, tmp); in check_one_file() 112 krb5_principal principal, in check_directory() argument 159 ret = check_one_file(context, filename, pwd, principal, result); in check_directory() 172 krb5_principal principal, in match_local_principals() argument 180 if(krb5_principal_get_comp_string(context, principal, 1) != NULL) in match_local_principals() 188 if(strcmp(krb5_principal_get_realm(context, principal), in match_local_principals() 191 if(strcmp(krb5_principal_get_comp_string(context, principal, 0), in match_local_principals() 238 krb5_principal principal, in krb5_kuserok() argument 272 ret = check_one_file(context, buf, pwd, principal, &result); in krb5_kuserok() [all …]
|
| H A D | salt.c | 102 krb5_const_principal principal, in krb5_get_pw_salt() argument 111 len = strlen(principal->realm); in krb5_get_pw_salt() 112 for (i = 0; i < principal->name.name_string.len; ++i) in krb5_get_pw_salt() 113 len += strlen(principal->name.name_string.val[i]); in krb5_get_pw_salt() 118 memcpy (p, principal->realm, strlen(principal->realm)); in krb5_get_pw_salt() 119 p += strlen(principal->realm); in krb5_get_pw_salt() 120 for (i = 0; i < principal->name.name_string.len; ++i) { in krb5_get_pw_salt() 122 principal->name.name_string.val[i], in krb5_get_pw_salt() 123 strlen(principal->name.name_string.val[i])); in krb5_get_pw_salt() 124 p += strlen(principal->name.name_string.val[i]); in krb5_get_pw_salt() [all …]
|
| H A D | keytab.c | 346 krb5_principal principal, in krb5_kt_read_service_key() argument 364 ret = krb5_kt_get_entry (context, keytab, principal, vno, enctype, &entry); in krb5_kt_read_service_key() 517 krb5_const_principal principal) in compare_aliseses() argument 523 if (krb5_principal_compare(context, &entry->aliases->val[i], principal)) in compare_aliseses() 547 krb5_const_principal principal, in krb5_kt_compare() argument 551 if(principal != NULL && in krb5_kt_compare() 552 !(krb5_principal_compare(context, entry->principal, principal) || in krb5_kt_compare() 553 compare_aliseses(context, entry, principal))) in krb5_kt_compare() 566 krb5_const_principal principal, in _krb5_kt_principal_not_found() argument 573 krb5_unparse_name_fixed (context, principal, princ, sizeof(princ)); in _krb5_kt_principal_not_found() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | t_ref_kerb.out | 1 parsed (and unparsed) principal(tytso): 'tytso@ATHENA.MIT.EDU' 2 parsed (and unparsed) principal(tytso@SHAZAAM): MATCH 3 parsed (and unparsed) principal(tytso/root@VEGGIE.COM): MATCH 4 parsed (and unparsed) principal(tytso/tuber/carrot@VEGGIE.COM): MATCH 5 parsed (and unparsed) principal(tytso/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/p/q/r/s/t): 'tytso/a/b/c/d/e/f/… 6 parsed (and unparsed) principal(tytso/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/p/q/r/s/t@FOO): MATCH 7 parsed (and unparsed) principal(tytso\\0/\0@B\n\t\\GAG): MATCH 8 parsed (and unparsed) principal(tytso/\n/\b\t@B\0hacky-test): MATCH 9 parsed (and unparsed) principal(\/slash/\@atsign/octa\/thorpe@\/slash\@at\/sign): MATCH 10 name_type principal(host/www.krb5.test@KRB5.TEST): 1 [all …]
|
| H A D | unparse.c | 137 k5_unparse_name(krb5_context context, krb5_const_principal principal, in k5_unparse_name() argument 146 if (!principal || !name) in k5_unparse_name() 159 if (krb5_realm_compare(context, &p, principal)) in k5_unparse_name() 164 totalsize += component_length_quoted(&principal->realm, flags); in k5_unparse_name() 168 for (i = 0; i < principal->length; i++) { in k5_unparse_name() 169 totalsize += component_length_quoted(&principal->data[i], flags); in k5_unparse_name() 172 if (principal->length == 0) in k5_unparse_name() 200 for (i = 0; i < principal->length; i++) { in k5_unparse_name() 201 q += copy_component_quoting(q, &principal->data[i], flags); in k5_unparse_name() 209 q += copy_component_quoting(q, &principal->realm, flags); in k5_unparse_name() [all …]
|
| H A D | ser_princ.c | 31 k5_size_principal(krb5_principal principal, size_t *sizep) in k5_size_principal() argument 44 if (principal != NULL && in k5_size_principal() 45 !(kret = krb5_unparse_name(NULL, principal, &fname))) { in k5_size_principal() 53 k5_externalize_principal(krb5_principal principal, in k5_externalize_principal() argument 66 if (principal != NULL) { in k5_externalize_principal() 68 if (!k5_size_principal(principal, &required) && required <= remain) { in k5_externalize_principal() 69 if (!(kret = krb5_unparse_name(NULL, principal, &fname))) { in k5_externalize_principal() 92 krb5_principal principal = NULL; in k5_internalize_principal() local 120 &principal); in k5_internalize_principal() 132 *argp = principal; in k5_internalize_principal() [all …]
|
| /freebsd/crypto/heimdal/kadmin/ |
| H A D | cpw.c | 45 set_random_key (krb5_principal principal) in set_random_key() argument 52 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys); in set_random_key() 62 set_random_password (krb5_principal principal) in set_random_password() argument 68 ret = kadm5_chpass_principal(kadm_handle, principal, pw); in set_random_password() 72 krb5_unparse_name(context, principal, &princ_name); in set_random_password() 82 set_password (krb5_principal principal, char *password) in set_password() argument 91 krb5_unparse_name(context, principal, &princ_name); in set_password() 102 ret = kadm5_chpass_principal(kadm_handle, principal, password); in set_password() 108 set_key_data (krb5_principal principal, krb5_key_data *key_data) in set_key_data() argument 112 ret = kadm5_chpass_principal_with_key (kadm_handle, principal, in set_key_data() [all …]
|
| H A D | kadmin-commands.in | 146 help = "principal's password" 169 help = "principal attributes" 175 help = "principal expiration time" 188 argument = "principal..." 190 help = "Adds a principal to the database." 219 argument = "principal..." 228 argument = "principal..." 234 argument = "principal enctype..." 236 help = "Delete all the mentioned enctypes for principal." 246 argument = "principal enctype..." [all …]
|
| /freebsd/crypto/heimdal/admin/ |
| H A D | remove.c | 44 krb5_principal principal = NULL; in kt_remove() local 48 ret = krb5_parse_name(context, opt->principal_string, &principal); in kt_remove() 62 if(principal) in kt_remove() 63 krb5_free_principal(context, principal); in kt_remove() 68 if (!principal && !enctype && !opt->kvno_integer) { in kt_remove() 81 entry.principal = principal; in kt_remove() 89 if(principal) in kt_remove() 90 krb5_free_principal(context, principal); in kt_remove()
|
| H A D | change.c | 40 krb5_principal principal, krb5_kvno kvno, in change_entry() argument 51 ret = krb5_unparse_name (context, principal, &client_name); in change_entry() 60 realm = krb5_principal_get_realm(context, principal); in change_entry() 99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); in change_entry() 110 new_entry.principal = principal; in change_entry() 129 krb5_principal principal; member 161 if (krb5_principal_compare (context, changeset[i].principal, in kt_change() 162 entry.principal)) { in kt_change() 184 if (krb5_principal_compare (context, princ, entry.principal)) in kt_change() 205 ret = krb5_copy_principal (context, entry.principal, in kt_change() [all …]
|
| H A D | rename.c | 82 if(krb5_principal_compare(context, entry.principal, from_princ)) { in kt_rename() 83 krb5_free_principal(context, entry.principal); in kt_rename() 84 entry.principal = to_princ; in kt_rename() 87 entry.principal = NULL; in kt_rename() 93 entry.principal = from_princ; in kt_rename() 96 entry.principal = NULL; in kt_rename() 102 entry.principal = NULL; in kt_rename()
|
| /freebsd/crypto/krb5/src/lib/krb5/ccache/ |
| H A D | ccfns.c | 60 krb5_principal principal) in krb5_cc_initialize() argument 62 TRACE_CC_INIT(context, cache, principal); in krb5_cc_initialize() 63 return cache->ops->init(context, cache, principal); in krb5_cc_initialize() 116 krb5_principal *principal) in krb5_cc_get_principal() argument 118 return cache->ops->get_princ(context, cache, principal); in krb5_cc_get_principal() 185 krb5_const_principal principal, in k5_build_conf_principals() argument 198 if (principal) { in k5_build_conf_principals() 199 ret = krb5_unparse_name(context, principal, &pname); in k5_build_conf_principals() 219 krb5_const_principal principal) in krb5_is_config_principal() argument 221 const krb5_data *realm = &principal->realm; in krb5_is_config_principal() [all …]
|
| /freebsd/crypto/heimdal/lib/gssapi/krb5/ |
| H A D | acquire_cred.c | 40 krb5_principal principal, in __gsskrb5_ccache_lifetime() argument 48 in_cred.client = principal; in __gsskrb5_ccache_lifetime() 50 realm = krb5_principal_get_realm(context, principal); in __gsskrb5_ccache_lifetime() 142 if (handle->principal) { in acquire_initiator_cred() 144 handle->principal, in acquire_initiator_cred() 163 } else if (handle->principal == NULL) { in acquire_initiator_cred() 164 kret = krb5_copy_principal(context, def_princ, &handle->principal); in acquire_initiator_cred() 167 } else if (handle->principal != NULL && in acquire_initiator_cred() 168 krb5_principal_compare(context, handle->principal, in acquire_initiator_cred() 179 if (handle->principal == NULL) { in acquire_initiator_cred() [all …]
|
| H A D | copy_ccache.c | 97 &handle->principal); in _gsskrb5_krb5_import_cred() 108 handle->principal, in _gsskrb5_krb5_import_cred() 111 krb5_free_principal(context, handle->principal); in _gsskrb5_krb5_import_cred() 122 handle->principal, in _gsskrb5_krb5_import_cred() 125 krb5_free_principal(context, handle->principal); in _gsskrb5_krb5_import_cred() 147 if (keytab_principal && handle->principal == NULL) { in _gsskrb5_krb5_import_cred() 150 &handle->principal); in _gsskrb5_krb5_import_cred() 187 if (handle->principal) in _gsskrb5_krb5_import_cred() 188 krb5_free_principal(context, handle->principal); in _gsskrb5_krb5_import_cred()
|
| /freebsd/contrib/pam-krb5/module/ |
| H A D | alt-auth.c | 40 char **principal) in pamk5_map_principal() argument 82 *principal = malloc(needed); in pamk5_map_principal() 83 if (*principal == NULL) in pamk5_map_principal() 88 memcpy(*principal + offset, user, strlen(user)); in pamk5_map_principal() 92 (*principal)[offset] = *p; in pamk5_map_principal() 97 (*principal)[offset] = '@'; in pamk5_map_principal() 99 memcpy(*principal + offset, realm, strlen(realm)); in pamk5_map_principal() 102 (*principal)[offset] = '\0'; in pamk5_map_principal() 146 char *principal; in pamk5_alt_auth() local 148 retval = krb5_unparse_name(ctx->context, princ, &principal); in pamk5_alt_auth() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/keytab/ |
| H A D | kt_file.c | 286 krb5_const_principal principal, krb5_kvno kvno, in krb5_ktfile_get_entry() argument 318 cur_entry.principal = 0; in krb5_ktfile_get_entry() 333 if (!krb5_principal_compare(context, principal, new_entry.principal)) { in krb5_ktfile_get_entry() 348 if (cur_entry.principal == NULL || in krb5_ktfile_get_entry() 371 cur_entry.principal == NULL) { in krb5_ktfile_get_entry() 381 if (cur_entry.principal) in krb5_ktfile_get_entry() 387 if (krb5_unparse_name(context, principal, &princname) == 0) { in krb5_ktfile_get_entry() 592 krb5_principal_compare(context, entry->principal, cur_entry.principal)) { in krb5_ktfile_remove() 951 ret_entry->principal = (krb5_principal)malloc(sizeof(krb5_principal_data)); in krb5_ktfileint_internal_read_entry() 952 if (!ret_entry->principal) in krb5_ktfileint_internal_read_entry() [all …]
|
| /freebsd/crypto/heimdal/lib/kadm5/ |
| H A D | default_keys.c | 82 parse_file(krb5_context context, krb5_principal principal, int no_salt) in parse_file() argument 88 ret = hdb_generate_key_set(context, principal, &keys, &nkeys, no_salt); in parse_file() 102 krb5_principal principal; in main() local 108 ret = krb5_parse_name(context, "lha@SU.SE", &principal); in main() 112 parse_file(context, principal, 0); in main() 113 parse_file(context, principal, 1); in main() 115 krb5_free_principal(context, principal); in main()
|
| /freebsd/crypto/krb5/src/lib/kadm5/ |
| H A D | admin.h | 191 krb5_principal principal; member 369 krb5_principal principal); 376 krb5_principal principal, 380 krb5_principal principal, 383 krb5_principal principal, 389 krb5_principal principal, 393 krb5_principal principal, 401 krb5_principal principal, 406 krb5_principal principal, 414 krb5_principal principal, [all …]
|
| /freebsd/tools/regression/rpcsec_gss/ |
| H A D | rpctest.c | 55 print_principal(rpc_gss_principal_t principal) in print_principal() argument 60 len = principal->len; in print_principal() 61 p = (uint8_t *) principal->name; in print_principal() 283 char principal[128 + 5]; in test_server() local 297 snprintf(principal, sizeof(principal), "host@%s", hostname); in test_server() 301 if (!rpc_gss_set_svc_name(principal, *mechs, GSS_C_INDEFINITE, in test_server() 307 principal, *mechs, in test_server() 322 namebuf.value = principal; in test_server() 323 namebuf.length = strlen(principal); in test_server() 354 rpc_gss_principal_t principal; in test_get_principal_name() local [all …]
|
| /freebsd/contrib/pam-krb5/tests/config/ |
| H A D | README | 8 A keytab for a principal (in the same realm as the test principal 10 that test principal. For an MIT Kerberos KDC, it needs "mci" 11 permissions in kadm5.acl for that principal. For a Heimdal KDC, it 14 modification of a principal will be skipped. 29 An optional keytab for a principal, which generally should be in the 36 fully-qualified principal (including the realm) of a Kerberos 37 principal to use for testing authentication. The second line is the 38 password for that principal. 40 If the realm of the principal is not configured in either DNS or in 49 authentication for the user listed in the pkinit-principal file. [all …]
|
| /freebsd/sys/rpc/ |
| H A D | rpcsec_gss.h | 152 const char *principal, gss_OID mech_oid, 156 const char *clnt_principal, const char *principal, 172 typedef bool_t rpc_gss_set_svc_name_ftype(const char *principal, 181 typedef bool_t rpc_gss_get_principal_name_ftype(rpc_gss_principal_t *principal, 217 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal, in rpc_gss_secfind_call() argument 223 ret = (*rpc_gss_entries.rpc_gss_secfind)(clnt, cred, principal, in rpc_gss_secfind_call() 238 const char *clnt_principal, const char *principal, const char *mechanism, in rpc_gss_seccreate_call() argument 246 clnt_principal, principal, mechanism, service, qop, in rpc_gss_seccreate_call() 343 rpc_gss_set_svc_name_call(const char *principal, const char *mechanism, in rpc_gss_set_svc_name_call() argument 349 ret = (*rpc_gss_entries.rpc_gss_set_svc_name)(principal, in rpc_gss_set_svc_name_call() [all …]
|
| /freebsd/crypto/heimdal/kuser/ |
| H A D | kinit.c | 349 krb5_principal principal, in get_new_tickets() argument 397 realm = krb5_principal_get_realm(context, principal); in get_new_tickets() 399 ret = krb5_unparse_name_flags(context, principal, in get_new_tickets() 424 krb5_principal_get_realm(context, principal), opt); in get_new_tickets() 441 principal, in get_new_tickets() 511 principal, in get_new_tickets() 520 principal, in get_new_tickets() 536 krb5_unparse_name (context, principal, &p); in get_new_tickets() 550 principal, in get_new_tickets() 690 krb5_principal principal; member [all …]
|
| /freebsd/contrib/pam-krb5/tests/tap/ |
| H A D | kerberos.c | 116 config->principal = bstrdup(name); in kerberos_kinit() 123 code = krb5_parse_name(ctx, config->principal, &kprinc); in kerberos_kinit() 125 bail_krb5(ctx, code, "error parsing principal %s", config->principal); in kerberos_kinit() 168 char principal[BUFSIZ], *command; in kerberos_kinit() local 185 if (fgets(principal, sizeof(principal), file) == NULL) in kerberos_kinit() 188 if (principal[strlen(principal) - 1] != '\n') in kerberos_kinit() 190 principal[strlen(principal) - 1] = '\0'; in kerberos_kinit() 191 config->principal = bstrdup(principal); in kerberos_kinit() 195 basprintf(&command, format[i], config->keytab, principal); in kerberos_kinit() 221 free(config->principal); in kerberos_free() [all …]
|