Searched refs:admin_realm (Results 1 – 4 of 4) sorted by relevance
/titanic_44/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_password.c | 329 char admin_realm[1024]; in krb5_verifypw() local 359 (void) strlcpy(admin_realm, in krb5_verifypw() 361 sizeof (admin_realm)); in krb5_verifypw() 364 params.realm = admin_realm; in krb5_verifypw() 367 if (kadm5_get_cpw_host_srv_name(context, admin_realm, &cpw_service)) { in krb5_verifypw() 371 admin_realm); in krb5_verifypw() 429 char msg_ret[1024], admin_realm[1024]; in krb5_changepw() local 457 (void) snprintf(admin_realm, sizeof (admin_realm), "%s", in krb5_changepw() 460 params.realm = admin_realm; in krb5_changepw() 463 if (kadm5_get_cpw_host_srv_name(context, admin_realm, &cpw_service)) { in krb5_changepw() [all …]
|
H A D | krb5_acct_mgmt.c | 63 char admin_realm[1024]; in fetch_princ_entry() local 91 (void) strlcpy(admin_realm, in fetch_princ_entry() 93 sizeof (admin_realm)); in fetch_princ_entry() 97 params.realm = admin_realm; in fetch_princ_entry() 99 if (kadm5_get_cpw_host_srv_name(context, admin_realm, &cpw_service)) { in fetch_princ_entry() 103 admin_realm); in fetch_princ_entry()
|
/titanic_44/usr/src/cmd/krb5/kadmin/kpasswd/ |
H A D | kpasswd.c | 114 char msg_ret[1024], admin_realm[1024]; local 211 snprintf(admin_realm, sizeof (admin_realm), 214 params.realm = admin_realm; 217 if (kadm5_get_cpw_host_srv_name(context, admin_realm, &cpw_service)) { 220 whoami, admin_realm); 236 admin_realm,
|
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 176 char admin_realm[1024], *cpw_service=NULL, *princ_str=NULL; in __krb5_get_init_creds_password() local 301 snprintf(admin_realm, sizeof (admin_realm), in __krb5_get_init_creds_password() 304 params.realm = admin_realm; in __krb5_get_init_creds_password() 306 ret=kadm5_get_cpw_host_srv_name(context, admin_realm, &cpw_service); in __krb5_get_init_creds_password() 311 "service name for realm %s\n"), admin_realm); in __krb5_get_init_creds_password()
|