/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_file.c | 262 krb5_const_principal principal, krb5_kvno kvno, 297 cur_entry.principal = 0; 309 /* if the principal isn't the one requested, free new_entry 319 if (!krb5_principal_compare_flags(context, principal, 320 new_entry.principal, 325 } else if (!krb5_principal_compare(context, principal, 326 new_entry.principal)) { 374 if (! cur_entry.principal || 403 if (cur_entry.principal) 902 krb5_principal_compare(context, entry->principal, cur_entr 261 krb5_ktfile_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | pac.c | 511 krb5_const_principal principal) 580 "not match authtime '%s'. PAC principal is" 586 principal, 592 perr = krb5_unparse_name(context, principal, &p_name); 595 "Wrong principal in request: PAC verify: " 774 krb5_const_principal principal, 793 if (principal != NULL) { 794 ret = k5_pac_validate_client(context, pac, authtime, principal); 808 krb5_const_principal principal) 820 return k5_pac_validate_client(context, pac, authtime, principal); 508 k5_pac_validate_client(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal) argument 771 krb5_pac_verify(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument 805 k5_insert_client_info(krb5_context context, krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal) argument [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | svr_principal.c | 279 * Check to see if the principal exists 281 ret = kdb_get_entry(handle, entry->principal, &kdb, &adb); 327 &polent, entry->principal); 392 principal. */ 395 entry->principal, &(kdb.princ)))) { 523 /* In all cases key and the principal data is set, let the database provider know */ 557 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument 569 if (principal == NULL) 572 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb))) 594 ret = kdb_delete_entry(handle, principal); 858 kadm5_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, long in_mask) argument 1399 kadm5_chpass_principal(void *server_handle, krb5_principal principal, char *password) argument 1408 kadm5_chpass_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument 1614 kadm5_randkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock **keyblocks, int *n_keys) argument 1639 kadm5_randkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keyblocks, int *n_keys) argument 1920 kadm5_setkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock *keyblocks, int n_keys) argument 1932 kadm5_setkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock *keyblocks, int n_keys) argument 2297 kadm5_check_min_life(void *server_handle, krb5_principal principal, char *msg_ret, unsigned int msg_len) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_decode.c | 87 * Allocate a principal and initialize enough fields for 1687 krb5_principal *principal) 1691 *principal = NULL; 1703 *principal = princ; 1686 asn1_decode_setpw_req(asn1buf *buf, krb5_data *newpasswd, krb5_principal *principal) argument
|
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | admin.h | 89 * The kadmin/admin principal is unused on Solaris. This principal is used 238 krb5_principal principal; member in struct:_kadm5_principal_ent_t 467 krb5_principal principal, 480 krb5_principal principal); 487 krb5_principal principal, 491 krb5_principal principal, 494 krb5_principal principal, 505 krb5_principal principal, 510 krb5_principal principal, [all...] |
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 886 principal, but passing it as a separate argument makes it 1689 char **fullname, krb5_principal * principal) 1700 if ((retval = krb5_parse_name(context, fname, principal))) 1686 krb5_db_setup_mkey_name(krb5_context context, const char *keyname, const char *realm, char **fullname, krb5_principal * principal) argument
|
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_ads.c | 1316 char *principal; local 1326 principal = smb_ads_get_principal(domain, user); 1328 principal = strdup(user); 1330 if (principal == NULL) 1333 rc = smb_kinit(principal, (char *)password); 1334 free(principal); 1352 * avoid Solaris Kerberos from acquiring a ticket for the principal in another 1473 * ah->domain is often used for generating service principal name. 2120 * constructing service principal name. Return the fully-qualified hostname 3057 * user principal nam 3063 char *principal; local [all...] |