Home
last modified time | relevance | path

Searched refs:realm (Results 1 – 25 of 129) sorted by relevance

123456

/titanic_51/usr/src/lib/krb5/kadm5/
H A Dkadm_host_srv_names.c19 * Find the admin server for the given realm. If the realm is null or
20 * the empty string, find the admin server for the default realm.
25 kadm5_get_master(krb5_context context, const char *realm, char **master) in kadm5_get_master() argument
40 if (realm == 0 || *realm == '\0') in kadm5_get_master()
44 realm ? realm : def_realm, in kadm5_get_master()
52 * Initialize realm info for (possible) DNS lookups. in kadm5_get_master()
54 dns_realm.data = strdup(realm in kadm5_get_master()
83 kadm5_get_kpasswd(krb5_context context,const char * realm,char ** kpasswd) kadm5_get_kpasswd() argument
152 kadm5_get_adm_host_srv_name(krb5_context context,const char * realm,char ** host_service_name) kadm5_get_adm_host_srv_name() argument
181 kadm5_get_cpw_host_srv_name(krb5_context context,const char * realm,char ** host_service_name) kadm5_get_cpw_host_srv_name() argument
214 kadm5_get_kiprop_host_srv_name(krb5_context context,const char * realm,char ** host_service_name) kadm5_get_kiprop_host_srv_name() argument
240 kadm5_is_master(krb5_context context,const char * realm,krb5_boolean * is_master) kadm5_is_master() argument
[all...]
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dhst_realm.c35 Figures out the Kerberos realm names for host, filling in a
52 * this implementation only provides one realm per host, using the same
56 * return the name of the Kerberos realm for the host.
58 * return the local realm name, as supplied by krb5_get_default_realm().
88 * Try to look up a TXT record pointing to a Kerberos realm
92 krb5_try_realm_txt_rr(const char *prefix, const char *name, char **realm) in krb5_try_realm_txt_rr() argument
117 realm names are absolutes, let's stop that. in krb5_try_realm_txt_rr()
140 *realm = malloc((size_t)len + 1); in krb5_try_realm_txt_rr()
141 if (*realm == NULL) { in krb5_try_realm_txt_rr()
145 strncpy(*realm, (cons in krb5_try_realm_txt_rr()
203 char *realm, *cp, *temp_realm; krb5_get_host_realm() local
344 char *realm = (char *)NULL, *cp; krb5_get_fallback_host_realm() local
486 krb5int_domain_get_realm(krb5_context context,const char * domain,char ** realm) krb5int_domain_get_realm() argument
539 krb5int_fqdn_get_realm(krb5_context context,const char * fqdn,char ** realm) krb5int_fqdn_get_realm() argument
[all...]
H A Ddef_realm.c80 * find a realm based on the DNS name of that address. Assumes that its being
101 /* Try to find realm using returned DNS name */ in krb5int_address_get_realm()
105 /* If a realm was found return 1 to immediately halt in krb5int_address_get_realm()
117 * Retrieves the default realm to be used if no user-specified realm is
119 * realm omitted for convenience]
125 * Implementation: the default realm is stored in a configuration file,
127 * the default local realm name.
133 char *realm = 0; in krb5_get_default_realm() local
145 * Another way to provide the default realm in krb5_get_default_realm()
[all...]
H A Dlocate_kdc.c86 /* Solaris Kerberos: default to dns lookup for the KDC but not the realm */
381 module_locate_server (krb5_context ctx, const krb5_data *realm, in module_locate_server() argument
422 code = vtbl->lookup(blob, svc, realm->data, socktype, family, in module_locate_server()
428 Tprintf("plugin doesn't handle this realm (KRB5_PLUGIN_NO_HANDLE)\n"); in module_locate_server()
457 enum locate_service_type svc, const char *realm,
475 override_locate_server (krb5_context ctx, const krb5_data *realm, in override_locate_server() argument
499 code = lookup_func(ctx, svc, realm->data, socktype, family, in override_locate_server()
521 prof_locate_server (krb5_context context, const krb5_data *realm, in prof_locate_server() argument
552 if ((host = malloc(realm->length + 1)) == NULL) in prof_locate_server()
555 (void) strncpy(host, realm in prof_locate_server()
581 dns_locate_server(krb5_context context,const krb5_data * realm,struct srv_dns_entry ** dns_list_head,enum locate_service_type svc,int socktype,int family) dns_locate_server() argument
861 krb5int_locate_server(krb5_context context,const krb5_data * realm,struct addrlist * addrlist,enum locate_service_type svc,int socktype,int family) krb5int_locate_server() argument
1076 krb5_locate_kdc(krb5_context context,const krb5_data * realm,struct addrlist * addrlist,int get_masters,int socktype,int family) krb5_locate_kdc() argument
1093 krb5_get_servername(krb5_context context,const krb5_data * realm,const char * name,const char * proto,char * srvhost,unsigned short * port) krb5_get_servername() argument
[all...]
H A Ddnssrv.c57 krb5int_make_srv_query_realm(const krb5_data *realm, in krb5int_make_srv_query_realm() argument
74 * service.protocol.realm in krb5int_make_srv_query_realm()
82 if (memchr(realm->data, 0, realm->length)) in krb5int_make_srv_query_realm()
84 if ( strlen(service) + strlen(protocol) + realm->length + 6 in krb5int_make_srv_query_realm()
87 sprintf(host, "%s.%s.%.*s", service, protocol, (int) realm->length, in krb5int_make_srv_query_realm()
88 realm->data); in krb5int_make_srv_query_realm()
93 realm names are absolutes, let's stop that. in krb5int_make_srv_query_realm()
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_misc.c32 target->realm.length = source->realm.length; in asn1_krb5_realm_copy()
33 target->realm.data = (char*)malloc(target->realm.length); /* copy realm */ in asn1_krb5_realm_copy()
34 if (target->realm.data == NULL) return ENOMEM; in asn1_krb5_realm_copy()
35 memcpy(target->realm.data,source->realm.data, /* to client */ in asn1_krb5_realm_copy()
36 target->realm.length); in asn1_krb5_realm_copy()
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/profile/
H A Dprof_solaris.c96 __profile_get_domain_realm(profile_t profile, char *realm, char ***domains) in __profile_get_domain_realm() argument
98 if (profile == NULL || realm == NULL || domains == NULL) in __profile_get_domain_realm()
101 return (__profile_iter_name_value(profile, "domain_realm", realm, in __profile_get_domain_realm()
192 __profile_set_libdefaults(profile_t profile, char *realm) in __profile_set_libdefaults() argument
197 if (profile == NULL || realm == NULL) in __profile_set_libdefaults()
209 code = profile_add_relation(profile, hierarchy, realm); in __profile_set_libdefaults()
215 __profile_set_kdc(profile_t profile, char *realm, char *kdc, in __profile_set_kdc() argument
221 if (profile == NULL || realm == NULL || kdc == NULL) in __profile_set_kdc()
225 hierarchy[1] = realm; in __profile_set_kdc()
287 * char *realm)
294 __profile_add_domain_mapping(profile_t profile,char * domain,char * realm) __profile_add_domain_mapping() argument
326 __profile_remove_domain_mapping(profile_t profile,char * realm) __profile_remove_domain_mapping() argument
369 __profile_get_realm_entry(profile_t profile,char * realm,char * name,char *** ret_value) __profile_get_realm_entry() argument
409 __profile_add_realm_entry(profile_t profile,char * realm,char * name,char ** values) __profile_add_realm_entry() argument
448 __profile_get_default_realm(profile_t profile,char ** realm) __profile_get_default_realm() argument
505 __profile_add_realm(profile_t profile,char * realm,char * master,char ** kdcs,boolean_t set_change,boolean_t default_realm) __profile_add_realm() argument
578 __profile_remove_xrealm_mapping(profile_t profile,char * realm) __profile_remove_xrealm_mapping() argument
673 __profile_remove_realm(profile_t profile,char * realm) __profile_remove_realm() argument
[all...]
/titanic_51/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dcopy_princ.c87 tempprinc->realm.length = inprinc->realm.length; in krb5_copy_principal()
90 * Allocate one extra byte for the realm name string terminator. The in krb5_copy_principal()
91 * realm and principle component strings alway leave a null byte after in krb5_copy_principal()
94 tempprinc->realm.data = MALLOC(tempprinc->realm.length + 1); in krb5_copy_principal()
95 if (!tempprinc->realm.data) { in krb5_copy_principal()
103 memcpy(tempprinc->realm.data, inprinc->realm.data, in krb5_copy_principal()
104 inprinc->realm in krb5_copy_principal()
[all...]
/titanic_51/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_profile.c231 pkinit_libdefault_strings(krb5_context context, const krb5_data *realm, in pkinit_libdefault_strings() argument
240 if (realm != NULL && realm->length > sizeof(realmstr)-1) in pkinit_libdefault_strings()
243 if (realm != NULL) { in pkinit_libdefault_strings()
245 (void) strlcpy(realmstr, realm->data, realm->length + 1); in pkinit_libdefault_strings()
246 realmstr[realm->length] = '\0'; in pkinit_libdefault_strings()
255 if (realm != NULL) { in pkinit_libdefault_strings()
315 pkinit_libdefault_string(krb5_context context, const krb5_data *realm, in pkinit_libdefault_string() argument
321 retval = pkinit_libdefault_strings(context, realm, optio in pkinit_libdefault_string()
340 pkinit_libdefault_boolean(krb5_context context,const krb5_data * realm,const char * option,int default_value,int * ret_value) pkinit_libdefault_boolean() argument
359 pkinit_libdefault_integer(krb5_context context,const krb5_data * realm,const char * option,int default_value,int * ret_value) pkinit_libdefault_integer() argument
[all...]
/titanic_51/usr/src/cmd/krb5/kadmin/kclient/
H A Dkclient.sh27 # supplying information about the Kerberos realm and kdc.
153 egrep -s "$(gettext "add_principal: Principal or policy already exists while creating \"$service_princ@$realm\".")" $TMP_FILE
156 egrep -s "$(gettext "Principal \"$service_princ@$realm\" created.")" $TMP_FILE
171 egrep -s "$service_princ@$realm" $TMP_FILE
210 printf "\tdefault_realm = $realm\n" 1>&3
214 printf "\t$kdc = $realm\n" 1>&3
217 printf "\t$FKDC = $realm\n" 1>&3
218 printf "\t$client_machine = $realm\n" 1>&3
220 printf "\t.$domain = $realm\n\n" 1>&3
222 printf "\t.$short_fqdn = $realm\
[all...]
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_findrealm.c29 * the components of a principal (princ) but match on any realm. When a
30 * suitable entry is found return the entry's realm.
36 krb5_principal princ, krb5_data *realm) { in krb5_kt_find_realm() argument
51 memcpy(&tmp_realm, &ent.principal->realm, sizeof (krb5_data)); in krb5_kt_find_realm()
52 memcpy(&ent.principal->realm, &princ->realm, in krb5_kt_find_realm()
57 /* Copy the realm back */ in krb5_kt_find_realm()
58 memcpy(&ent.principal->realm, &tmp_realm, sizeof (krb5_data)); in krb5_kt_find_realm()
63 * Copy its realm in krb5_kt_find_realm()
66 &ent.principal->realm, real in krb5_kt_find_realm()
[all...]
H A Dktfns.c60 if (krb5_is_referral_realm(&principal->realm)) { in krb5_kt_get_entry()
61 char *realm; in krb5_kt_get_entry() local
64 err = krb5_get_default_realm(context, &realm); in krb5_kt_get_entry()
67 princ_data.realm.data = realm; in krb5_kt_get_entry()
68 princ_data.realm.length = strlen(realm); in krb5_kt_get_entry()
73 krb5_free_default_realm(context, princ_data.realm.data); in krb5_kt_get_entry()
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dset_realm.c34 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) in krb5_set_principal_realm() argument
39 if (!realm || !*realm) in krb5_set_principal_realm()
42 length = strlen(realm); in krb5_set_principal_realm()
46 strcpy(newrealm, realm); in krb5_set_principal_realm()
H A Dget_creds.c312 /* stuff the client realm into the server principal. in krb5_validate_or_renew_creds()
314 if (in_creds.server->realm.length < in_creds.client->realm.length) in krb5_validate_or_renew_creds()
315 if ((in_creds.server->realm.data = in krb5_validate_or_renew_creds()
316 (char *) realloc(in_creds.server->realm.data, in krb5_validate_or_renew_creds()
317 in_creds.client->realm.length)) == NULL) { in krb5_validate_or_renew_creds()
322 in_creds.server->realm.length = in_creds.client->realm.length; in krb5_validate_or_renew_creds()
323 memcpy(in_creds.server->realm.data, in_creds.client->realm in krb5_validate_or_renew_creds()
[all...]
H A Dconv_princ.c33 * principal into name, instance, and realm.
46 /* The maximum sizes for V4 aname, realm, sname, and instance +1 */
63 * Kadmin doesn't do realm conversion because it's currently
69 * component is a hostname, sometimes the realm name, sometimes it's
73 * likely on a per-realm basis, so locally-defined services can be
158 char *name, char *inst, char *realm) in krb5_524_conv_principal() argument
228 krb5 principal realm from krb5.conf realms stanza */ in krb5_524_conv_principal()
242 strncpy(realm, compo->data, compo->length); in krb5_524_conv_principal()
243 realm[compo->length] = '\0'; in krb5_524_conv_principal()
248 strncpy(realm, tmp_real in krb5_524_conv_principal()
259 krb5_425_conv_principal(krb5_context context,const char * name,const char * instance,const char * realm,krb5_principal * princ) krb5_425_conv_principal() argument
[all...]
H A Dappdefault.c38 static krb5_error_code appdefault_get(krb5_context context, const char *appname, const krb5_data *realm, const char *option, char **ret_value) in appdefault_get() argument
44 const char * realmstr = realm?realm->data:NULL; in appdefault_get()
97 * realm = { in appdefault_get()
139 krb5_appdefault_boolean(krb5_context context, const char *appname, const krb5_data *realm, const char *option, int default_value, int *ret_value) in krb5_appdefault_boolean() argument
144 retval = appdefault_get(context, appname, realm, option, &string); in krb5_appdefault_boolean()
154 krb5_appdefault_string(krb5_context context, const char *appname, const krb5_data *realm, const char *option, const char *default_value, char **ret_value) in krb5_appdefault_string() argument
159 retval = appdefault_get(context, appname, realm, option, &string); in krb5_appdefault_string()
H A Dget_in_tkt.c47 creds->server, (realm is taken from creds->client), with options
90 krb5_data *realm,
559 "Client/server realm mismatch in initial ticket request: '%s' requesting ticket '%s'"), in krb5_get_in_tkt()
699 &request.server->realm, in krb5_get_in_tkt()
797 krb5_libdefault_string(krb5_context context, const krb5_data *realm, in krb5_libdefault_string() argument
806 if (realm->length > sizeof(realmstr)-1) in krb5_libdefault_string()
809 strncpy(realmstr, realm->data, realm->length); in krb5_libdefault_string()
810 realmstr[realm->length] = '\0'; in krb5_libdefault_string()
873 krb5_libdefault_boolean(krb5_context context, const krb5_data *realm, in krb5_libdefault_boolean() argument
893 sort_krb5_padata_sequence(krb5_context context,krb5_data * realm,krb5_pa_data ** padata) sort_krb5_padata_sequence() argument
1508 char *realm = strpbrk(client_name, "@"); krb5_get_init_creds() local
[all...]
H A Dgic_keytab.c119 * have a referral realm. This happens when there is no applicable in krb5_get_init_creds_keytab()
120 * domain-to-realm mapping in the Kerberos configuration file. in krb5_get_init_creds_keytab()
121 * If that is the case then the realm of the first principal found in krb5_get_init_creds_keytab()
123 * realm. in krb5_get_init_creds_keytab()
125 if (krb5_is_referral_realm(&client->realm)) { in krb5_get_init_creds_keytab()
126 krb5_data realm; in krb5_get_init_creds_keytab() local
127 ret = krb5_kt_find_realm(context, keytab, client, &realm); in krb5_get_init_creds_keytab()
129 krb5_free_data_contents(context, &client->realm); in krb5_get_init_creds_keytab()
130 client->realm.length = realm in krb5_get_init_creds_keytab()
[all...]
H A Dbld_princ.c36 krb5_build_principal_va(krb5_context context, krb5_principal princ, unsigned int rlen, const char *realm, va_list ap) in krb5_build_principal_va() argument
46 /* get space for array and realm, and insert realm */ in krb5_build_principal_va()
57 memcpy(tmpdata, realm, rlen); in krb5_build_principal_va()
96 const char * realm, ...) in krb5_build_principal() argument
105 va_start(ap, realm); in krb5_build_principal()
106 retval = krb5_build_principal_va(context, pr_ret, rlen, realm, ap); in krb5_build_principal()
H A Drd_req_dec.c156 if (server && krb5_is_referral_realm(&server->realm)) { in krb5_rd_req_decoded_opt()
157 char *realm; in krb5_rd_req_decoded_opt() local
160 retval = krb5_get_default_realm(context, &realm); in krb5_rd_req_decoded_opt()
163 princ_data.realm.data = realm; in krb5_rd_req_decoded_opt()
164 princ_data.realm.length = strlen(realm); in krb5_rd_req_decoded_opt()
216 /* okay, now check cross-realm policy */ in krb5_rd_req_decoded_opt()
220 /* Single hop cross-realm tickets only */ in krb5_rd_req_decoded_opt()
232 /* No cross-realm ticket in krb5_rd_req_decoded_opt()
236 krb5_data * realm; krb5_rd_req_decoded_opt() local
260 krb5_data * realm; krb5_rd_req_decoded_opt() local
[all...]
/titanic_51/usr/src/cmd/krb5/kadmin/dbutil/
H A Dkadm5_create.c56 char *name, char *realm, int attrs, int lifetime);
64 static int add_admin_princs(void *handle, krb5_context context, char *realm);
133 retval = add_admin_princs(handle, context, params->realm); in kadm5_create_magic_princs()
145 * Purpose: concatenate a name and a realm to form a krb5 name
150 * realm (input) the realm
154 * pointer to name@realm, in allocated memory, or NULL if it
159 static char *build_name_with_realm(char *name, char *realm) in build_name_with_realm() argument
163 n = (char *) malloc(strlen(name) + strlen(realm) + 2); in build_name_with_realm()
164 sprintf(n, "%s@%s", name, realm); in build_name_with_realm()
188 add_admin_princs(void * handle,krb5_context context,char * realm) add_admin_princs() argument
381 add_admin_old_princ(void * handle,krb5_context context,char * name,char * realm,int attrs,int lifetime) add_admin_old_princ() argument
[all...]
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/include/
H A Dprofile.h132 long __profile_add_domain_mapping(profile_t profile, char *domain, char *realm);
133 long __profile_remove_domain_mapping(profile_t profile, char *realm);
134 long __profile_get_realm_entry(profile_t profile, char *realm, char *name,
136 long __profile_add_realm_entry(profile_t profile, char *realm, char *name,
138 long __profile_get_default_realm(profile_t profile, char **realm);
140 long __profile_add_realm(profile_t profile, char *realm, char *master,
142 long __profile_remove_xrealm_mapping(profile_t profile, char *realm);
143 long __profile_remove_realm(profile_t profile, char *realm);
/titanic_51/usr/src/lib/krb5/kadm5/srv/
H A Dserver_kdb.c58 char *realm; in kdb_init_master() local
65 if ((ret = krb5_get_default_realm(handle->context, &realm))) in kdb_init_master()
68 realm = r; in kdb_init_master()
73 realm, NULL, &master_princ))) in kdb_init_master()
100 free(realm); in kdb_init_master()
113 * r (r) realm of history principal to use, or NULL
134 char *realm, *hist_name; in kdb_init_hist() local
139 if ((ret = krb5_get_default_realm(handle->context, &realm))) in kdb_init_hist()
142 realm = r; in kdb_init_hist()
146 strlen(realm) in kdb_init_hist()
[all...]
/titanic_51/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_util.c233 in the local realm, then we must refuse to service the request in kdc_process_tgs_req()
234 if the client claims to be from the local realm. in kdc_process_tgs_req()
236 If we don't do this, then some other realm's nasty KDC can in kdc_process_tgs_req()
237 claim to be authenticating a client from our realm, and we'll in kdc_process_tgs_req()
339 /* someone in a foreign realm claiming to be local */ in kdc_process_tgs_req()
379 * The KDC should take the keytab associated with the realm and pass that to
496 * add_to_transited Adds the name of the realm which issued the
499 * the realm of the server listed in the ticket
504 * in compressed form. It will add the new realm while
506 * realm i
572 char *realm; add_to_transited() local
1457 krb5_data * realm; get_salt_from_key() local
[all...]
H A Dmain.c89 * Find the realm entry for a given realm.
111 if (!(newrealm = find_realm_data(sprinc->realm.data, in setup_server_realm()
112 (krb5_ui_4) sprinc->realm.length))) in setup_server_realm()
154 * Initialize a realm control structure from the alternate profile or from
157 * After we're complete here, the essence of the realm is embodied in the
158 * realm data and we should be all set to begin operation for that realm.
161 init_realm(krb5_context kcontext, char *progname, kdc_realm_t *rdp, char *realm, argument
170 if (!realm) {
[all...]

123456