Home
last modified time | relevance | path

Searched refs:principals (Results 1 – 25 of 35) sorted by relevance

12

/freebsd/crypto/openssh/
H A Dsshsig.c735 char *opts = NULL, *tmp, *cp, *principals = NULL; in parse_principals_key_and_options() local
759 if ((principals = strdup(tmp)) == NULL) { in parse_principals_key_and_options()
770 principals, 0) != 1) { in parse_principals_key_and_options()
813 *principalsp = principals; in parse_principals_key_and_options()
814 principals = NULL; /* transferred */ in parse_principals_key_and_options()
826 free(principals); in parse_principals_key_and_options()
836 char *cp, *oprincipals, *principals; in cert_filter_principals() local
842 oprincipals = principals = *principalsp; in cert_filter_principals()
850 while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') { in cert_filter_principals()
860 if (match_pattern(cert->cert->principals[i], cp)) { in cert_filter_principals()
[all …]
H A Dsshkey.c688 free(cert->principals[i]); in cert_free()
689 free(cert->principals); in cert_free()
709 cert->principals = NULL; in cert_new()
1577 if ((to->principals = calloc(from->nprincipals, in sshkey_cert_copy()
1578 sizeof(*to->principals))) == NULL) { in sshkey_cert_copy()
1583 to->principals[i] = strdup(from->principals[i]); in sshkey_cert_copy()
1584 if (to->principals[i] == NULL) { in sshkey_cert_copy()
1872 struct sshbuf *principals = NULL, *crit = NULL; in cert_parse() local
1886 (ret = sshbuf_froms(b, &principals)) != 0 || in cert_parse()
1913 while (sshbuf_len(principals) > 0) { in cert_parse()
[all …]
H A DPROTOCOL.certkeys85 string valid principals
105 string valid principals
125 string valid principals
142 string valid principals
176 "valid principals" is a string containing zero or more principals as
177 strings packed inside it. These principals list the names for which this
180 zero-length "valid principals" field means the certificate is valid for
H A Dauth2-pubkeyfile.c155 if ((result = match_list(cert->principals[i], in match_principals_option()
207 if (strcmp(cp, cert->principals[i]) != 0) in auth_check_principals_line()
210 loc, cert->principals[i]); in auth_check_principals_line()
H A Dssh-keygen.c1893 public->cert->principals = plist; in do_ca_sign()
2182 key->cert->principals[i]); in print_cert()
2926 char *principals = NULL, *cp, *tmp; in sig_find_principals() local
2945 verify_time, &principals)) != 0) { in sig_find_principals()
2954 tmp = principals; in sig_find_principals()
2963 free(principals); in sig_find_principals()
2972 char **principals = NULL; in sig_match_principals() local
2979 &principals, &nprincipals)) != 0) { in sig_match_principals()
2985 printf("%s\n", principals[i]); in sig_match_principals()
2986 free(principals[i]); in sig_match_principals()
[all …]
H A Dsshkey.h118 char **principals; member
H A DPROTOCOL.u2f107 string valid principals
125 string valid principals
/freebsd/crypto/openssh/regress/unittests/sshkey/
H A Dtest_sshkey.c61 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; in build_cert() local
78 principals = sshbuf_new(); in build_cert()
79 ASSERT_PTR_NE(principals, NULL); in build_cert()
80 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gsamsa"), 0); in build_cert()
81 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gregor"), 0); in build_cert()
98 ASSERT_INT_EQ(sshbuf_put_stringb(b, principals), 0); /* principals */ in build_cert()
113 sshbuf_free(principals); in build_cert()
428 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); in sshkey_tests()
429 ASSERT_PTR_NE(k1->cert->principals, NULL); in sshkey_tests()
430 k1->cert->principals[0] = strdup("estragon"); in sshkey_tests()
[all …]
/freebsd/crypto/openssh/regress/
H A Dsshsig.sh179 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
185 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
191 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
197 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
237 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile -f $OBJ/allowed_signers >/dev/null 2>&1 || \
243 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile -f $OBJ/allowed_signers >/dev/null 2>&1 && \
251 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
291 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
297 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
303 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
[all …]
H A DREADME.regress135 principals-command.sh: authorized principals command
H A DMakefile97 principals-command \
/freebsd/crypto/heimdal/doc/
H A Dkerberos4.texi19 First, Kerberos 4 and Kerberos 5 principals are different. A version 4
25 principal. One notable example is the ``host'' type principals, where
27 version 5 name is @samp{host}. For the class of principals that has a
43 simplest cases you can cover most principals with the first rule. If you
54 @code{krb5_425_conv_principal_ext} to convert principals when handling
69 be because these principals are not used anymore, or it might be just
73 principals. For instance, if you are using DNS lookups and you have two
74 principals @samp{rcmd.foo} and @samp{rcmd.bar}, where `foo' is a CNAME
75 for `bar', the resulting principals will be the same. Since the
89 you have a database that consists of the following principals:
[all …]
H A Dwhatis.texi24 the network (users and services, usually called @dfn{principals}). All
25 principals share a secret password (or key) with the kerberos server and
26 this enables principals to verify that the messages from the kerberos
64 In Kerberos, principals use @dfn{tickets} to prove that they are who
72 checks that both @var{A} and @var{B} are valid principals.
74 Having verified the validity of the principals, it creates a packet
H A Dsetup.texi128 The keys of all the principals are stored in the database. If you
150 default principals for that realm. You can have more than one realm in
204 All modifications of principals are done with with kadmin.
277 check are for existence and flags on important principals. The
329 The matching is from top to bottom for matching principals (and if given,
345 database. @samp{jimmy/admin} can only modify principals that belong to
348 component principals (ordinary users). He will not be able to change any
569 Then you need to create those principals that you added in the
666 kerberos principals using @file{kswitch} or built in support in
747 add the following principals to each realm. The principals should be
[all …]
H A Dmigration.texi24 @item Convert the database, check all principals that hprop complains
H A Dapps.texi254 Support for 2b tokens in the kdc are turned on for specific principals
H A Dwin2k.texi67 A mapping between local NT users and Kerberos principals must be specified.
/freebsd/crypto/heimdal/kadmin/
H A Dkadmin-commands.in104 …help = "Initializes the default principals for a realm. Creates the database\nif necessary. Local …
215 help = "Changes the password of one or more principals matching the expressions."
224 help = "Deletes all principals matching the expressions."
254 …help = "Extracts the keys of all principals matching the expressions, and stores them in a keytab.…
288 help = "Shows information about principals matching the expressions."
342 help = "allowed target principals"
398 help = "Lists principals in a terse format. Equivalent to \"get -t\"."
H A DChangeLog103 principals.
150 default. Return 1 on failure processing any of the principals.
153 the first error is returned when all principals are processed.
346 * mod.c: allow wildcarding principals, and make parameters a work
/freebsd/crypto/heimdal/admin/
H A Dktutil-commands.in113 help = "Change keys for specified principals (default all)."
163 help = "Change keys for specified principals, and add them to the keytab."
/freebsd/crypto/heimdal/appl/gssmask/
H A Dgssmaestro.c721 static getarg_strings principals; variable
725 { "principals", 0, arg_strings, &principals, "Test principal",
775 if (principals.num_strings == 0) in main()
778 user = estrdup(principals.strings[0]); in main()
/freebsd/crypto/heimdal/kdc/
H A Dkrb5tgs.c109 krb5_principals principals, in _kdc_add_KRB5SignedPath() argument
118 if (server && principals) { in _kdc_add_KRB5SignedPath()
119 ret = add_Principals(principals, server); in _kdc_add_KRB5SignedPath()
129 spd.delegated = principals; in _kdc_add_KRB5SignedPath()
156 sp.delegated = principals; in _kdc_add_KRB5SignedPath()
/freebsd/crypto/heimdal/
H A DChangeLog.1999250 with empty principals so that they actually use an empty realm and
512 sysloging of number of principals transferred
515 principals
734 principals in some other realm. From Miroslav Ruda
1042 cache if the principals are different. close and NULL the old one
H A DChangeLog.1998619 * lib/kadm5/server.c: Check for principals changing their own
623 involved principals.
715 all principals matching an expression.
1518 principals.
1915 * kdc/kerberos4.c: Check database when converting v4 principals.
2120 principals in creds. Should also compare them with that received
2227 for this to work is that all involved principals has a des key in
H A DChangeLog.20031154 principals at the same time
1157 principals at the same time
1370 * admin/change.c (kt_change): collect all principals we are going
1497 flag before giving out v4 tickets for foreign v5 principals

12