/freebsd/crypto/openssh/ |
H A D | sshsig.c | 735 char *opts = NULL, *tmp, *cp, *principals = NULL; in parse_principals_key_and_options() local 759 if ((principals = strdup(tmp)) == NULL) { in parse_principals_key_and_options() 770 principals, 0) != 1) { in parse_principals_key_and_options() 813 *principalsp = principals; in parse_principals_key_and_options() 814 principals = NULL; /* transferred */ in parse_principals_key_and_options() 826 free(principals); in parse_principals_key_and_options() 836 char *cp, *oprincipals, *principals; in cert_filter_principals() local 842 oprincipals = principals = *principalsp; in cert_filter_principals() 850 while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') { in cert_filter_principals() 860 if (match_pattern(cert->cert->principals[i], cp)) { in cert_filter_principals() [all …]
|
H A D | sshkey.c | 688 free(cert->principals[i]); in cert_free() 689 free(cert->principals); in cert_free() 709 cert->principals = NULL; in cert_new() 1577 if ((to->principals = calloc(from->nprincipals, in sshkey_cert_copy() 1578 sizeof(*to->principals))) == NULL) { in sshkey_cert_copy() 1583 to->principals[i] = strdup(from->principals[i]); in sshkey_cert_copy() 1584 if (to->principals[i] == NULL) { in sshkey_cert_copy() 1872 struct sshbuf *principals = NULL, *crit = NULL; in cert_parse() local 1886 (ret = sshbuf_froms(b, &principals)) != 0 || in cert_parse() 1913 while (sshbuf_len(principals) > 0) { in cert_parse() [all …]
|
H A D | PROTOCOL.certkeys | 85 string valid principals 105 string valid principals 125 string valid principals 142 string valid principals 176 "valid principals" is a string containing zero or more principals as 177 strings packed inside it. These principals list the names for which this 180 zero-length "valid principals" field means the certificate is valid for
|
H A D | auth2-pubkeyfile.c | 155 if ((result = match_list(cert->principals[i], in match_principals_option() 207 if (strcmp(cp, cert->principals[i]) != 0) in auth_check_principals_line() 210 loc, cert->principals[i]); in auth_check_principals_line()
|
H A D | ssh-keygen.c | 1893 public->cert->principals = plist; in do_ca_sign() 2182 key->cert->principals[i]); in print_cert() 2926 char *principals = NULL, *cp, *tmp; in sig_find_principals() local 2945 verify_time, &principals)) != 0) { in sig_find_principals() 2954 tmp = principals; in sig_find_principals() 2963 free(principals); in sig_find_principals() 2972 char **principals = NULL; in sig_match_principals() local 2979 &principals, &nprincipals)) != 0) { in sig_match_principals() 2985 printf("%s\n", principals[i]); in sig_match_principals() 2986 free(principals[i]); in sig_match_principals() [all …]
|
H A D | sshkey.h | 118 char **principals; member
|
H A D | PROTOCOL.u2f | 107 string valid principals 125 string valid principals
|
/freebsd/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 61 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; in build_cert() local 78 principals = sshbuf_new(); in build_cert() 79 ASSERT_PTR_NE(principals, NULL); in build_cert() 80 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gsamsa"), 0); in build_cert() 81 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gregor"), 0); in build_cert() 98 ASSERT_INT_EQ(sshbuf_put_stringb(b, principals), 0); /* principals */ in build_cert() 113 sshbuf_free(principals); in build_cert() 428 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); in sshkey_tests() 429 ASSERT_PTR_NE(k1->cert->principals, NULL); in sshkey_tests() 430 k1->cert->principals[0] = strdup("estragon"); in sshkey_tests() [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | sshsig.sh | 179 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 185 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 191 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 197 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 237 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile -f $OBJ/allowed_signers >/dev/null 2>&1 || \ 243 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile -f $OBJ/allowed_signers >/dev/null 2>&1 && \ 251 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 291 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 297 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 303 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ [all …]
|
H A D | README.regress | 135 principals-command.sh: authorized principals command
|
H A D | Makefile | 97 principals-command \
|
/freebsd/crypto/heimdal/doc/ |
H A D | kerberos4.texi | 19 First, Kerberos 4 and Kerberos 5 principals are different. A version 4 25 principal. One notable example is the ``host'' type principals, where 27 version 5 name is @samp{host}. For the class of principals that has a 43 simplest cases you can cover most principals with the first rule. If you 54 @code{krb5_425_conv_principal_ext} to convert principals when handling 69 be because these principals are not used anymore, or it might be just 73 principals. For instance, if you are using DNS lookups and you have two 74 principals @samp{rcmd.foo} and @samp{rcmd.bar}, where `foo' is a CNAME 75 for `bar', the resulting principals will be the same. Since the 89 you have a database that consists of the following principals: [all …]
|
H A D | whatis.texi | 24 the network (users and services, usually called @dfn{principals}). All 25 principals share a secret password (or key) with the kerberos server and 26 this enables principals to verify that the messages from the kerberos 64 In Kerberos, principals use @dfn{tickets} to prove that they are who 72 checks that both @var{A} and @var{B} are valid principals. 74 Having verified the validity of the principals, it creates a packet
|
H A D | setup.texi | 128 The keys of all the principals are stored in the database. If you 150 default principals for that realm. You can have more than one realm in 204 All modifications of principals are done with with kadmin. 277 check are for existence and flags on important principals. The 329 The matching is from top to bottom for matching principals (and if given, 345 database. @samp{jimmy/admin} can only modify principals that belong to 348 component principals (ordinary users). He will not be able to change any 569 Then you need to create those principals that you added in the 666 kerberos principals using @file{kswitch} or built in support in 747 add the following principals to each realm. The principals should be [all …]
|
H A D | migration.texi | 24 @item Convert the database, check all principals that hprop complains
|
H A D | apps.texi | 254 Support for 2b tokens in the kdc are turned on for specific principals
|
H A D | win2k.texi | 67 A mapping between local NT users and Kerberos principals must be specified.
|
/freebsd/crypto/heimdal/kadmin/ |
H A D | kadmin-commands.in | 104 …help = "Initializes the default principals for a realm. Creates the database\nif necessary. Local … 215 help = "Changes the password of one or more principals matching the expressions." 224 help = "Deletes all principals matching the expressions." 254 …help = "Extracts the keys of all principals matching the expressions, and stores them in a keytab.… 288 help = "Shows information about principals matching the expressions." 342 help = "allowed target principals" 398 help = "Lists principals in a terse format. Equivalent to \"get -t\"."
|
H A D | ChangeLog | 103 principals. 150 default. Return 1 on failure processing any of the principals. 153 the first error is returned when all principals are processed. 346 * mod.c: allow wildcarding principals, and make parameters a work
|
/freebsd/crypto/heimdal/admin/ |
H A D | ktutil-commands.in | 113 help = "Change keys for specified principals (default all)." 163 help = "Change keys for specified principals, and add them to the keytab."
|
/freebsd/crypto/heimdal/appl/gssmask/ |
H A D | gssmaestro.c | 721 static getarg_strings principals; variable 725 { "principals", 0, arg_strings, &principals, "Test principal", 775 if (principals.num_strings == 0) in main() 778 user = estrdup(principals.strings[0]); in main()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 109 krb5_principals principals, in _kdc_add_KRB5SignedPath() argument 118 if (server && principals) { in _kdc_add_KRB5SignedPath() 119 ret = add_Principals(principals, server); in _kdc_add_KRB5SignedPath() 129 spd.delegated = principals; in _kdc_add_KRB5SignedPath() 156 sp.delegated = principals; in _kdc_add_KRB5SignedPath()
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.1999 | 250 with empty principals so that they actually use an empty realm and 512 sysloging of number of principals transferred 515 principals 734 principals in some other realm. From Miroslav Ruda 1042 cache if the principals are different. close and NULL the old one
|
H A D | ChangeLog.1998 | 619 * lib/kadm5/server.c: Check for principals changing their own 623 involved principals. 715 all principals matching an expression. 1518 principals. 1915 * kdc/kerberos4.c: Check database when converting v4 principals. 2120 principals in creds. Should also compare them with that received 2227 for this to work is that all involved principals has a des key in
|
H A D | ChangeLog.2003 | 1154 principals at the same time 1157 principals at the same time 1370 * admin/change.c (kt_change): collect all principals we are going 1497 flag before giving out v4 tickets for foreign v5 principals
|