Lines Matching defs:keytab

79     krb5_keytab keytab = NULL;
101 * - pick the first principal in the keytab
109 "trying to select the most appropriate principal from keytab\n");
124 kerr = krb5_kt_resolve(krb_ctx, keytab_name, &keytab);
126 kerr = krb5_kt_default(krb_ctx, &keytab);
130 "Failed to read keytab [%s]: %s\n",
166 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm,
246 DEBUG(SSSDBG_MINOR_FAILURE, "No suitable principal found in keytab\n");
252 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to read keytab [%s]: %s\n",
254 sss_log(SSS_LOG_ERR, "Failed to read keytab [%s]: %s\n",
257 if (keytab) krb5_kt_close(krb_ctx, keytab);
353 krb5_keytab keytab,
366 kerr = krb5_kt_start_seq_get(ctx, keytab, &cursor);
373 "Trying to find principal %s@%s in keytab.\n", pattern_primary, pattern_realm);
375 while ((kt_err = krb5_kt_next_entry(ctx, keytab, &entry, &cursor)) == 0) {
383 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to free keytab entry.\n");
388 /* Close the keytab here. Even though we're using cursors, the file
390 * overwritten by other keytab calls, creating a leak. */
391 kerr = krb5_kt_end_seq_get(ctx, keytab, &cursor);
400 "No principal matching %s@%s found in keytab.\n",
407 DEBUG(SSSDBG_CRIT_FAILURE, "Error while reading keytab.\n");
422 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to free keytab entry.\n");
877 krb5_keytab keytab,
909 kerr = krb5_server_decrypt_ticket_keytab(ctx, keytab, ticket);
942 kerr = krb5_kt_get_entry(ctx, keytab, ticket->server,
1043 krb5_keytab keytab)
1046 return krb5_kt_have_content(context, keytab);
1053 kerr = krb5_kt_start_seq_get(context, keytab, &cursor);
1060 kerr = krb5_kt_next_entry(context, keytab, &entry, &cursor);
1061 kerr_end = krb5_kt_end_seq_get(context, keytab, &cursor);