/titanic_51/usr/src/lib/krb5/kadm5/ |
H A D | kadm_host_srv_names.c | 19 * Find the admin server for the given realm. If the realm is null or 20 * the empty string, find the admin server for the default realm. 25 kadm5_get_master(krb5_context context, const char *realm, char **master) in kadm5_get_master() argument 40 if (realm == 0 || *realm == '\0') in kadm5_get_master() 44 realm ? realm : def_realm, in kadm5_get_master() 52 * Initialize realm info for (possible) DNS lookups. in kadm5_get_master() 54 dns_realm.data = strdup(realm in kadm5_get_master() 83 kadm5_get_kpasswd(krb5_context context,const char * realm,char ** kpasswd) kadm5_get_kpasswd() argument 152 kadm5_get_adm_host_srv_name(krb5_context context,const char * realm,char ** host_service_name) kadm5_get_adm_host_srv_name() argument 181 kadm5_get_cpw_host_srv_name(krb5_context context,const char * realm,char ** host_service_name) kadm5_get_cpw_host_srv_name() argument 214 kadm5_get_kiprop_host_srv_name(krb5_context context,const char * realm,char ** host_service_name) kadm5_get_kiprop_host_srv_name() argument 240 kadm5_is_master(krb5_context context,const char * realm,krb5_boolean * is_master) kadm5_is_master() argument [all...] |
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | hst_realm.c | 35 Figures out the Kerberos realm names for host, filling in a 52 * this implementation only provides one realm per host, using the same 56 * return the name of the Kerberos realm for the host. 58 * return the local realm name, as supplied by krb5_get_default_realm(). 88 * Try to look up a TXT record pointing to a Kerberos realm 92 krb5_try_realm_txt_rr(const char *prefix, const char *name, char **realm) in krb5_try_realm_txt_rr() argument 117 realm names are absolutes, let's stop that. in krb5_try_realm_txt_rr() 140 *realm = malloc((size_t)len + 1); in krb5_try_realm_txt_rr() 141 if (*realm == NULL) { in krb5_try_realm_txt_rr() 145 strncpy(*realm, (cons in krb5_try_realm_txt_rr() 203 char *realm, *cp, *temp_realm; krb5_get_host_realm() local 344 char *realm = (char *)NULL, *cp; krb5_get_fallback_host_realm() local 486 krb5int_domain_get_realm(krb5_context context,const char * domain,char ** realm) krb5int_domain_get_realm() argument 539 krb5int_fqdn_get_realm(krb5_context context,const char * fqdn,char ** realm) krb5int_fqdn_get_realm() argument [all...] |
H A D | def_realm.c | 80 * find a realm based on the DNS name of that address. Assumes that its being 101 /* Try to find realm using returned DNS name */ in krb5int_address_get_realm() 105 /* If a realm was found return 1 to immediately halt in krb5int_address_get_realm() 117 * Retrieves the default realm to be used if no user-specified realm is 119 * realm omitted for convenience] 125 * Implementation: the default realm is stored in a configuration file, 127 * the default local realm name. 133 char *realm = 0; in krb5_get_default_realm() local 145 * Another way to provide the default realm in krb5_get_default_realm() [all...] |
H A D | locate_kdc.c | 86 /* Solaris Kerberos: default to dns lookup for the KDC but not the realm */ 381 module_locate_server (krb5_context ctx, const krb5_data *realm, in module_locate_server() argument 422 code = vtbl->lookup(blob, svc, realm->data, socktype, family, in module_locate_server() 428 Tprintf("plugin doesn't handle this realm (KRB5_PLUGIN_NO_HANDLE)\n"); in module_locate_server() 457 enum locate_service_type svc, const char *realm, 475 override_locate_server (krb5_context ctx, const krb5_data *realm, in override_locate_server() argument 499 code = lookup_func(ctx, svc, realm->data, socktype, family, in override_locate_server() 521 prof_locate_server (krb5_context context, const krb5_data *realm, in prof_locate_server() argument 552 if ((host = malloc(realm->length + 1)) == NULL) in prof_locate_server() 555 (void) strncpy(host, realm in prof_locate_server() 581 dns_locate_server(krb5_context context,const krb5_data * realm,struct srv_dns_entry ** dns_list_head,enum locate_service_type svc,int socktype,int family) dns_locate_server() argument 861 krb5int_locate_server(krb5_context context,const krb5_data * realm,struct addrlist * addrlist,enum locate_service_type svc,int socktype,int family) krb5int_locate_server() argument 1076 krb5_locate_kdc(krb5_context context,const krb5_data * realm,struct addrlist * addrlist,int get_masters,int socktype,int family) krb5_locate_kdc() argument 1093 krb5_get_servername(krb5_context context,const krb5_data * realm,const char * name,const char * proto,char * srvhost,unsigned short * port) krb5_get_servername() argument [all...] |
H A D | dnssrv.c | 57 krb5int_make_srv_query_realm(const krb5_data *realm, in krb5int_make_srv_query_realm() argument 74 * service.protocol.realm in krb5int_make_srv_query_realm() 82 if (memchr(realm->data, 0, realm->length)) in krb5int_make_srv_query_realm() 84 if ( strlen(service) + strlen(protocol) + realm->length + 6 in krb5int_make_srv_query_realm() 87 sprintf(host, "%s.%s.%.*s", service, protocol, (int) realm->length, in krb5int_make_srv_query_realm() 88 realm->data); in krb5int_make_srv_query_realm() 93 realm names are absolutes, let's stop that. in krb5int_make_srv_query_realm()
|
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_misc.c | 32 target->realm.length = source->realm.length; in asn1_krb5_realm_copy() 33 target->realm.data = (char*)malloc(target->realm.length); /* copy realm */ in asn1_krb5_realm_copy() 34 if (target->realm.data == NULL) return ENOMEM; in asn1_krb5_realm_copy() 35 memcpy(target->realm.data,source->realm.data, /* to client */ in asn1_krb5_realm_copy() 36 target->realm.length); in asn1_krb5_realm_copy()
|
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/profile/ |
H A D | prof_solaris.c | 96 __profile_get_domain_realm(profile_t profile, char *realm, char ***domains) in __profile_get_domain_realm() argument 98 if (profile == NULL || realm == NULL || domains == NULL) in __profile_get_domain_realm() 101 return (__profile_iter_name_value(profile, "domain_realm", realm, in __profile_get_domain_realm() 192 __profile_set_libdefaults(profile_t profile, char *realm) in __profile_set_libdefaults() argument 197 if (profile == NULL || realm == NULL) in __profile_set_libdefaults() 209 code = profile_add_relation(profile, hierarchy, realm); in __profile_set_libdefaults() 215 __profile_set_kdc(profile_t profile, char *realm, char *kdc, in __profile_set_kdc() argument 221 if (profile == NULL || realm == NULL || kdc == NULL) in __profile_set_kdc() 225 hierarchy[1] = realm; in __profile_set_kdc() 287 * char *realm) 294 __profile_add_domain_mapping(profile_t profile,char * domain,char * realm) __profile_add_domain_mapping() argument 326 __profile_remove_domain_mapping(profile_t profile,char * realm) __profile_remove_domain_mapping() argument 369 __profile_get_realm_entry(profile_t profile,char * realm,char * name,char *** ret_value) __profile_get_realm_entry() argument 409 __profile_add_realm_entry(profile_t profile,char * realm,char * name,char ** values) __profile_add_realm_entry() argument 448 __profile_get_default_realm(profile_t profile,char ** realm) __profile_get_default_realm() argument 505 __profile_add_realm(profile_t profile,char * realm,char * master,char ** kdcs,boolean_t set_change,boolean_t default_realm) __profile_add_realm() argument 578 __profile_remove_xrealm_mapping(profile_t profile,char * realm) __profile_remove_xrealm_mapping() argument 673 __profile_remove_realm(profile_t profile,char * realm) __profile_remove_realm() argument [all...] |
/titanic_51/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | copy_princ.c | 87 tempprinc->realm.length = inprinc->realm.length; in krb5_copy_principal() 90 * Allocate one extra byte for the realm name string terminator. The in krb5_copy_principal() 91 * realm and principle component strings alway leave a null byte after in krb5_copy_principal() 94 tempprinc->realm.data = MALLOC(tempprinc->realm.length + 1); in krb5_copy_principal() 95 if (!tempprinc->realm.data) { in krb5_copy_principal() 103 memcpy(tempprinc->realm.data, inprinc->realm.data, in krb5_copy_principal() 104 inprinc->realm in krb5_copy_principal() [all...] |
/titanic_51/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_profile.c | 231 pkinit_libdefault_strings(krb5_context context, const krb5_data *realm, in pkinit_libdefault_strings() argument 240 if (realm != NULL && realm->length > sizeof(realmstr)-1) in pkinit_libdefault_strings() 243 if (realm != NULL) { in pkinit_libdefault_strings() 245 (void) strlcpy(realmstr, realm->data, realm->length + 1); in pkinit_libdefault_strings() 246 realmstr[realm->length] = '\0'; in pkinit_libdefault_strings() 255 if (realm != NULL) { in pkinit_libdefault_strings() 315 pkinit_libdefault_string(krb5_context context, const krb5_data *realm, in pkinit_libdefault_string() argument 321 retval = pkinit_libdefault_strings(context, realm, optio in pkinit_libdefault_string() 340 pkinit_libdefault_boolean(krb5_context context,const krb5_data * realm,const char * option,int default_value,int * ret_value) pkinit_libdefault_boolean() argument 359 pkinit_libdefault_integer(krb5_context context,const krb5_data * realm,const char * option,int default_value,int * ret_value) pkinit_libdefault_integer() argument [all...] |
/titanic_51/usr/src/cmd/krb5/kadmin/kclient/ |
H A D | kclient.sh | 27 # supplying information about the Kerberos realm and kdc. 153 egrep -s "$(gettext "add_principal: Principal or policy already exists while creating \"$service_princ@$realm\".")" $TMP_FILE 156 egrep -s "$(gettext "Principal \"$service_princ@$realm\" created.")" $TMP_FILE 171 egrep -s "$service_princ@$realm" $TMP_FILE 210 printf "\tdefault_realm = $realm\n" 1>&3 214 printf "\t$kdc = $realm\n" 1>&3 217 printf "\t$FKDC = $realm\n" 1>&3 218 printf "\t$client_machine = $realm\n" 1>&3 220 printf "\t.$domain = $realm\n\n" 1>&3 222 printf "\t.$short_fqdn = $realm\ [all...] |
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_findrealm.c | 29 * the components of a principal (princ) but match on any realm. When a 30 * suitable entry is found return the entry's realm. 36 krb5_principal princ, krb5_data *realm) { in krb5_kt_find_realm() argument 51 memcpy(&tmp_realm, &ent.principal->realm, sizeof (krb5_data)); in krb5_kt_find_realm() 52 memcpy(&ent.principal->realm, &princ->realm, in krb5_kt_find_realm() 57 /* Copy the realm back */ in krb5_kt_find_realm() 58 memcpy(&ent.principal->realm, &tmp_realm, sizeof (krb5_data)); in krb5_kt_find_realm() 63 * Copy its realm in krb5_kt_find_realm() 66 &ent.principal->realm, real in krb5_kt_find_realm() [all...] |
H A D | ktfns.c | 60 if (krb5_is_referral_realm(&principal->realm)) { in krb5_kt_get_entry() 61 char *realm; in krb5_kt_get_entry() local 64 err = krb5_get_default_realm(context, &realm); in krb5_kt_get_entry() 67 princ_data.realm.data = realm; in krb5_kt_get_entry() 68 princ_data.realm.length = strlen(realm); in krb5_kt_get_entry() 73 krb5_free_default_realm(context, princ_data.realm.data); in krb5_kt_get_entry()
|
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | set_realm.c | 34 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) in krb5_set_principal_realm() argument 39 if (!realm || !*realm) in krb5_set_principal_realm() 42 length = strlen(realm); in krb5_set_principal_realm() 46 strcpy(newrealm, realm); in krb5_set_principal_realm()
|
H A D | get_creds.c | 312 /* stuff the client realm into the server principal. in krb5_validate_or_renew_creds() 314 if (in_creds.server->realm.length < in_creds.client->realm.length) in krb5_validate_or_renew_creds() 315 if ((in_creds.server->realm.data = in krb5_validate_or_renew_creds() 316 (char *) realloc(in_creds.server->realm.data, in krb5_validate_or_renew_creds() 317 in_creds.client->realm.length)) == NULL) { in krb5_validate_or_renew_creds() 322 in_creds.server->realm.length = in_creds.client->realm.length; in krb5_validate_or_renew_creds() 323 memcpy(in_creds.server->realm.data, in_creds.client->realm in krb5_validate_or_renew_creds() [all...] |
H A D | conv_princ.c | 33 * principal into name, instance, and realm. 46 /* The maximum sizes for V4 aname, realm, sname, and instance +1 */ 63 * Kadmin doesn't do realm conversion because it's currently 69 * component is a hostname, sometimes the realm name, sometimes it's 73 * likely on a per-realm basis, so locally-defined services can be 158 char *name, char *inst, char *realm) in krb5_524_conv_principal() argument 228 krb5 principal realm from krb5.conf realms stanza */ in krb5_524_conv_principal() 242 strncpy(realm, compo->data, compo->length); in krb5_524_conv_principal() 243 realm[compo->length] = '\0'; in krb5_524_conv_principal() 248 strncpy(realm, tmp_real in krb5_524_conv_principal() 259 krb5_425_conv_principal(krb5_context context,const char * name,const char * instance,const char * realm,krb5_principal * princ) krb5_425_conv_principal() argument [all...] |
H A D | appdefault.c | 38 static krb5_error_code appdefault_get(krb5_context context, const char *appname, const krb5_data *realm, const char *option, char **ret_value) in appdefault_get() argument 44 const char * realmstr = realm?realm->data:NULL; in appdefault_get() 97 * realm = { in appdefault_get() 139 krb5_appdefault_boolean(krb5_context context, const char *appname, const krb5_data *realm, const char *option, int default_value, int *ret_value) in krb5_appdefault_boolean() argument 144 retval = appdefault_get(context, appname, realm, option, &string); in krb5_appdefault_boolean() 154 krb5_appdefault_string(krb5_context context, const char *appname, const krb5_data *realm, const char *option, const char *default_value, char **ret_value) in krb5_appdefault_string() argument 159 retval = appdefault_get(context, appname, realm, option, &string); in krb5_appdefault_string()
|
H A D | get_in_tkt.c | 47 creds->server, (realm is taken from creds->client), with options 90 krb5_data *realm, 559 "Client/server realm mismatch in initial ticket request: '%s' requesting ticket '%s'"), in krb5_get_in_tkt() 699 &request.server->realm, in krb5_get_in_tkt() 797 krb5_libdefault_string(krb5_context context, const krb5_data *realm, in krb5_libdefault_string() argument 806 if (realm->length > sizeof(realmstr)-1) in krb5_libdefault_string() 809 strncpy(realmstr, realm->data, realm->length); in krb5_libdefault_string() 810 realmstr[realm->length] = '\0'; in krb5_libdefault_string() 873 krb5_libdefault_boolean(krb5_context context, const krb5_data *realm, in krb5_libdefault_boolean() argument 893 sort_krb5_padata_sequence(krb5_context context,krb5_data * realm,krb5_pa_data ** padata) sort_krb5_padata_sequence() argument 1508 char *realm = strpbrk(client_name, "@"); krb5_get_init_creds() local [all...] |
H A D | gic_keytab.c | 119 * have a referral realm. This happens when there is no applicable in krb5_get_init_creds_keytab() 120 * domain-to-realm mapping in the Kerberos configuration file. in krb5_get_init_creds_keytab() 121 * If that is the case then the realm of the first principal found in krb5_get_init_creds_keytab() 123 * realm. in krb5_get_init_creds_keytab() 125 if (krb5_is_referral_realm(&client->realm)) { in krb5_get_init_creds_keytab() 126 krb5_data realm; in krb5_get_init_creds_keytab() local 127 ret = krb5_kt_find_realm(context, keytab, client, &realm); in krb5_get_init_creds_keytab() 129 krb5_free_data_contents(context, &client->realm); in krb5_get_init_creds_keytab() 130 client->realm.length = realm in krb5_get_init_creds_keytab() [all...] |
H A D | bld_princ.c | 36 krb5_build_principal_va(krb5_context context, krb5_principal princ, unsigned int rlen, const char *realm, va_list ap) in krb5_build_principal_va() argument 46 /* get space for array and realm, and insert realm */ in krb5_build_principal_va() 57 memcpy(tmpdata, realm, rlen); in krb5_build_principal_va() 96 const char * realm, ...) in krb5_build_principal() argument 105 va_start(ap, realm); in krb5_build_principal() 106 retval = krb5_build_principal_va(context, pr_ret, rlen, realm, ap); in krb5_build_principal()
|
H A D | rd_req_dec.c | 156 if (server && krb5_is_referral_realm(&server->realm)) { in krb5_rd_req_decoded_opt() 157 char *realm; in krb5_rd_req_decoded_opt() local 160 retval = krb5_get_default_realm(context, &realm); in krb5_rd_req_decoded_opt() 163 princ_data.realm.data = realm; in krb5_rd_req_decoded_opt() 164 princ_data.realm.length = strlen(realm); in krb5_rd_req_decoded_opt() 216 /* okay, now check cross-realm policy */ in krb5_rd_req_decoded_opt() 220 /* Single hop cross-realm tickets only */ in krb5_rd_req_decoded_opt() 232 /* No cross-realm ticket in krb5_rd_req_decoded_opt() 236 krb5_data * realm; krb5_rd_req_decoded_opt() local 260 krb5_data * realm; krb5_rd_req_decoded_opt() local [all...] |
/titanic_51/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kadm5_create.c | 56 char *name, char *realm, int attrs, int lifetime); 64 static int add_admin_princs(void *handle, krb5_context context, char *realm); 133 retval = add_admin_princs(handle, context, params->realm); in kadm5_create_magic_princs() 145 * Purpose: concatenate a name and a realm to form a krb5 name 150 * realm (input) the realm 154 * pointer to name@realm, in allocated memory, or NULL if it 159 static char *build_name_with_realm(char *name, char *realm) in build_name_with_realm() argument 163 n = (char *) malloc(strlen(name) + strlen(realm) + 2); in build_name_with_realm() 164 sprintf(n, "%s@%s", name, realm); in build_name_with_realm() 188 add_admin_princs(void * handle,krb5_context context,char * realm) add_admin_princs() argument 381 add_admin_old_princ(void * handle,krb5_context context,char * name,char * realm,int attrs,int lifetime) add_admin_old_princ() argument [all...] |
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/include/ |
H A D | profile.h | 132 long __profile_add_domain_mapping(profile_t profile, char *domain, char *realm); 133 long __profile_remove_domain_mapping(profile_t profile, char *realm); 134 long __profile_get_realm_entry(profile_t profile, char *realm, char *name, 136 long __profile_add_realm_entry(profile_t profile, char *realm, char *name, 138 long __profile_get_default_realm(profile_t profile, char **realm); 140 long __profile_add_realm(profile_t profile, char *realm, char *master, 142 long __profile_remove_xrealm_mapping(profile_t profile, char *realm); 143 long __profile_remove_realm(profile_t profile, char *realm);
|
/titanic_51/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_kdb.c | 58 char *realm; in kdb_init_master() local 65 if ((ret = krb5_get_default_realm(handle->context, &realm))) in kdb_init_master() 68 realm = r; in kdb_init_master() 73 realm, NULL, &master_princ))) in kdb_init_master() 100 free(realm); in kdb_init_master() 113 * r (r) realm of history principal to use, or NULL 134 char *realm, *hist_name; in kdb_init_hist() local 139 if ((ret = krb5_get_default_realm(handle->context, &realm))) in kdb_init_hist() 142 realm = r; in kdb_init_hist() 146 strlen(realm) in kdb_init_hist() [all...] |
/titanic_51/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.c | 233 in the local realm, then we must refuse to service the request in kdc_process_tgs_req() 234 if the client claims to be from the local realm. in kdc_process_tgs_req() 236 If we don't do this, then some other realm's nasty KDC can in kdc_process_tgs_req() 237 claim to be authenticating a client from our realm, and we'll in kdc_process_tgs_req() 339 /* someone in a foreign realm claiming to be local */ in kdc_process_tgs_req() 379 * The KDC should take the keytab associated with the realm and pass that to 496 * add_to_transited Adds the name of the realm which issued the 499 * the realm of the server listed in the ticket 504 * in compressed form. It will add the new realm while 506 * realm i 572 char *realm; add_to_transited() local 1457 krb5_data * realm; get_salt_from_key() local [all...] |
H A D | main.c | 89 * Find the realm entry for a given realm. 111 if (!(newrealm = find_realm_data(sprinc->realm.data, in setup_server_realm() 112 (krb5_ui_4) sprinc->realm.length))) in setup_server_realm() 154 * Initialize a realm control structure from the alternate profile or from 157 * After we're complete here, the essence of the realm is embodied in the 158 * realm data and we should be all set to begin operation for that realm. 161 init_realm(krb5_context kcontext, char *progname, kdc_realm_t *rdp, char *realm, argument 170 if (!realm) { [all...] |