/sssd-io/src/providers/krb5/ |
H A D | krb5_keytab.c | 4 Kerberos 5 Backend Module -- keytab related utilities 40 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n"); 61 DEBUG(SSSDBG_MINOR_FAILURE, "Failed to free keytab entry.\n"); 81 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n"); 94 krb5_keytab keytab = NULL; local 116 kerr = krb5_kt_resolve(kctx, keytab_file, &keytab); 118 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s].\n", 123 kerr = sss_krb5_kt_have_content(kctx, keytab); 125 DEBUG(SSSDBG_CRIT_FAILURE, "keytab [%s] has not entries.\n", 130 kerr = krb5_kt_get_name(kctx, keytab, keytab_nam [all...] |
H A D | krb5_child_handler.c | 108 const char *keytab; local 116 keytab = dp_opt_get_cstring(kr->krb5_ctx->opts, KRB5_KEYTAB); 117 if (keytab == NULL) { 118 DEBUG(SSSDBG_CRIT_FAILURE, "Missing keytab option.\n"); 169 buf->size += 4*sizeof(uint32_t) + strlen(kr->ccname) + strlen(keytab) + 224 SAFEALIGN_SET_UINT32(&buf->data[rp], strlen(keytab), &rp); 225 safealign_memcpy(&buf->data[rp], keytab, strlen(keytab), &rp);
|
H A D | krb5_child.c | 93 char *keytab; member in struct:krb5_req 1307 krb5_keytab keytab; local 1316 memset(&keytab, 0, sizeof(keytab)); 1317 kerr = krb5_kt_resolve(kr->ctx, kr->keytab, &keytab); 1319 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s], " \ 1320 "not verifying TGT.\n", kr->keytab); 1325 kerr = krb5_kt_start_seq_get(kr->ctx, keytab, &cursor); 1327 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab [ 1450 get_and_save_tgt_with_keytab(krb5_context ctx, struct cli_opts *cli_opts, krb5_principal princ, krb5_keytab keytab, char *ccname) argument 2576 krb5_keytab keytab = NULL; local [all...] |
/sssd-io/src/tests/cmocka/ |
H A D | common_mock_krb5.c | 8 SSSD tests: Tests keytab utilities 34 krb5_keytab keytab; local 37 kerr = krb5_kt_resolve(kctx, kt_path, &keytab); 41 kerr = krb5_kt_add_entry(kctx, keytab, &kt_keys[n]); 45 kerr = krb5_kt_close(kctx, keytab);
|
H A D | test_copy_keytab.c | 7 SSSD tests: Tests keytab utilities 32 #define KEYTAB_TEST_PRINC "test/keytab@TEST.KEYTAB" 33 #define KEYTAB_PATH TESTS_PATH "/keytab_test.keytab" 34 #define EMPTY_KEYTAB_PATH TESTS_PATH "/empty_keytab_test.keytab" 108 krb5_keytab keytab; local 120 kerr = krb5_kt_resolve(test_ctx->kctx, mem_keytab_name, &keytab); 123 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 9, 9, 127 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 1, 132 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 2, 137 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ct 159 krb5_keytab keytab; local 208 krb5_keytab keytab; local [all...] |
H A D | test_ipa_subdomains_server.c | 51 #define KEYTAB_PATH TEST_DIR"/"TESTS_PATH"/keytab_test.keytab" 67 #define ONEWAY_KEYTAB TEST_DIR"/"TESTS_PATH"/"SUBDOM_REALM".keytab" 394 const char *keytab, 423 /* the system keytab is always used with two-way trusts */ 426 if (keytab != NULL) { 428 assert_string_equal(s, keytab); 806 /* Test scenario where a keytab already exists, but refresh fails. In this case, 807 * sssd should attempt to reuse the previous keytab 840 /* Tests case where there's no keytab and retrieving fails. Just fail the 390 assert_trust_object(struct ipa_ad_server_ctx *trust, const char *dom_name, const char *dom_realm, const char *sid, const char *keytab, const char *authid, const char *sdap_realm) argument
|
/sssd-io/src/providers/ldap/ |
H A D | ldap_child.c | 192 krb5_keytab keytab) 200 krberr = krb5_kt_start_seq_get(context, keytab, &cursor); 203 "Cannot read keytab [%s].\n", KEYTAB_CLEAN_NAME); 205 sss_log(SSS_LOG_ERR, "Error reading keytab file [%s]: [%d][%s]. " 215 while ((krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) { 219 "Could not parse keytab entry\n"); 220 sss_log(SSS_LOG_ERR, "Could not parse keytab entry\n"); 233 DEBUG(SSSDBG_CRIT_FAILURE,"Could not free keytab entry contents\n"); 242 krberr = krb5_kt_end_seq_get(context, keytab, &cursor); 244 DEBUG(SSSDBG_FATAL_FAILURE, "Could not close keytab 189 lc_verify_keytab_ex(const char *principal, const char *keytab_name, krb5_context context, krb5_keytab keytab) argument 282 krb5_keytab keytab = NULL; local [all...] |
H A D | sdap_async_connection.c | 1051 /* ==Perform-Kinit-given-keytab-and-principal============================= */ 1054 const char *keytab; member in struct:sdap_kinit_state 1079 const char *keytab, 1091 keytab ? keytab : "default", 1102 state->keytab = keytab; 1175 state->principal, state->keytab, 1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
|
/sssd-io/src/providers/ad/ |
H A D | ad_common.c | 275 const char *keytab) 297 if (keytab != NULL) { 298 ret = dp_opt_set_string(ad_options->basic, AD_KEYTAB, keytab); 300 DEBUG(SSSDBG_OP_FAILURE, "Cannot set keytab\n"); 316 const char *keytab) 331 keytab); 355 const char *keytab, 379 subdom->name, hostname, keytab); 271 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument 309 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb, const char *conf_path, struct data_provider *dp, const char *realm, struct sss_domain_info *subdom, const char *hostname, const char *keytab) argument 349 ad_create_1way_trust_options(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb, const char *subdom_conf_path, struct data_provider *dp, struct sss_domain_info *subdom, const char *hostname, const char *keytab, const char *sasl_authid) argument
|
H A D | ad_subdomains.c | 250 const char *keytab; local 255 keytab = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KEYTAB); 274 hostname, keytab);
|
/sssd-io/src/providers/ipa/ |
H A D | ipa_subdomains_server.c | 40 "%s/%s.keytab", IPA_TRUST_KEYTAB_DIR, forest); 66 /* Shouldn't happen, but let's try system keytab in this case */ 138 char *keytab; local 142 keytab = forest_keytab(id_ctx, forest); 144 if (keytab == NULL || principal == NULL) { 154 keytab, 157 talloc_free(keytab); 395 const char *keytab) 411 if (server == NULL || principal == NULL || keytab == NULL) { 417 "Retrieving keytab fo 390 ipa_getkeytab_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *ccache, const char *server, const char *principal, const char *keytab) argument 574 ipa_check_keytab(const char *keytab, uid_t kt_owner_uid, gid_t kt_owner_gid) argument 614 const char *keytab; member in struct:ipa_server_trusted_dom_setup_state [all...] |
/sssd-io/src/util/ |
H A D | sss_krb5.c | 79 krb5_keytab keytab = NULL; local 101 * - pick the first principal in the keytab 109 "trying to select the most appropriate principal from keytab\n"); 124 kerr = krb5_kt_resolve(krb_ctx, keytab_name, &keytab); 126 kerr = krb5_kt_default(krb_ctx, &keytab); 130 "Failed to read keytab [%s]: %s\n", 166 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm, 246 DEBUG(SSSDBG_MINOR_FAILURE, "No suitable principal found in keytab\n"); 252 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to read keytab [%s]: %s\n", 254 sss_log(SSS_LOG_ERR, "Failed to read keytab [ 352 find_principal_in_keytab(krb5_context ctx, krb5_keytab keytab, const char *pattern_primary, const char *pattern_realm, krb5_principal *princ) argument 873 sss_extract_pac(krb5_context ctx, krb5_ccache ccache, krb5_principal server_principal, krb5_principal client_principal, krb5_keytab keytab, krb5_authdata ***_pac_authdata) argument 1042 sss_krb5_kt_have_content(krb5_context context, krb5_keytab keytab) argument [all...] |