Searched defs:principal (Results 26 - 32 of 32) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_file.c262 krb5_const_principal principal, krb5_kvno kvno,
297 cur_entry.principal = 0;
309 /* if the principal isn't the one requested, free new_entry
319 if (!krb5_principal_compare_flags(context, principal,
320 new_entry.principal,
325 } else if (!krb5_principal_compare(context, principal,
326 new_entry.principal)) {
374 if (! cur_entry.principal ||
403 if (cur_entry.principal)
902 krb5_principal_compare(context, entry->principal, cur_entr
261 krb5_ktfile_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpac.c511 krb5_const_principal principal)
580 "not match authtime '%s'. PAC principal is"
586 principal,
592 perr = krb5_unparse_name(context, principal, &p_name);
595 "Wrong principal in request: PAC verify: "
774 krb5_const_principal principal,
793 if (principal != NULL) {
794 ret = k5_pac_validate_client(context, pac, authtime, principal);
808 krb5_const_principal principal)
820 return k5_pac_validate_client(context, pac, authtime, principal);
508 k5_pac_validate_client(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal) argument
771 krb5_pac_verify(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument
805 k5_insert_client_info(krb5_context context, krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal) argument
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dsvr_principal.c279 * Check to see if the principal exists
281 ret = kdb_get_entry(handle, entry->principal, &kdb, &adb);
327 &polent, entry->principal);
392 principal. */
395 entry->principal, &(kdb.princ)))) {
523 /* In all cases key and the principal data is set, let the database provider know */
557 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument
569 if (principal == NULL)
572 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
594 ret = kdb_delete_entry(handle, principal);
858 kadm5_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, long in_mask) argument
1399 kadm5_chpass_principal(void *server_handle, krb5_principal principal, char *password) argument
1408 kadm5_chpass_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
1614 kadm5_randkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock **keyblocks, int *n_keys) argument
1639 kadm5_randkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keyblocks, int *n_keys) argument
1920 kadm5_setkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock *keyblocks, int n_keys) argument
1932 kadm5_setkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock *keyblocks, int n_keys) argument
2297 kadm5_check_min_life(void *server_handle, krb5_principal principal, char *msg_ret, unsigned int msg_len) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_k_decode.c87 * Allocate a principal and initialize enough fields for
1687 krb5_principal *principal)
1691 *principal = NULL;
1703 *principal = princ;
1686 asn1_decode_setpw_req(asn1buf *buf, krb5_data *newpasswd, krb5_principal *principal) argument
/osnet-11/usr/src/lib/krb5/kadm5/
H A Dadmin.h89 * The kadmin/admin principal is unused on Solaris. This principal is used
238 krb5_principal principal; member in struct:_kadm5_principal_ent_t
467 krb5_principal principal,
480 krb5_principal principal);
487 krb5_principal principal,
491 krb5_principal principal,
494 krb5_principal principal,
505 krb5_principal principal,
510 krb5_principal principal,
[all...]
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkdb5.c886 principal, but passing it as a separate argument makes it
1689 char **fullname, krb5_principal * principal)
1700 if ((retval = krb5_parse_name(context, fname, principal)))
1686 krb5_db_setup_mkey_name(krb5_context context, const char *keyname, const char *realm, char **fullname, krb5_principal * principal) argument
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_ads.c1316 char *principal; local
1326 principal = smb_ads_get_principal(domain, user);
1328 principal = strdup(user);
1330 if (principal == NULL)
1333 rc = smb_kinit(principal, (char *)password);
1334 free(principal);
1352 * avoid Solaris Kerberos from acquiring a ticket for the principal in another
1473 * ah->domain is often used for generating service principal name.
2120 * constructing service principal name. Return the fully-qualified hostname
3057 * user principal nam
3063 char *principal; local
[all...]

Completed in 2743 milliseconds

12