/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | set_realm.c | 34 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) argument 48 (void) krb5_xfree(krb5_princ_realm(context,principal)->data); 50 krb5_princ_realm(context, principal)->length = length; 51 krb5_princ_realm(context, principal)->data = newrealm;
|
/illumos-gate/usr/src/cmd/krb5/kadmin/server/ |
H A D | server_glue_v1.c | 41 krb5_principal principal, 44 return kadm5_get_principal(server_handle, principal,(kadm5_principal_ent_t) ent, 0); 40 kadm5_get_principal_v1(void *server_handle, krb5_principal principal, kadm5_principal_ent_t_v1 *ent) argument
|
H A D | misc.c | 41 * principal (input) krb5_principals whose password we are 60 krb5_principal principal, 69 ret = kadm5_check_min_life(server_handle, principal, NULL, 0); 73 return kadm5_chpass_principal_3(server_handle, principal, 86 * principal (input) krb5_principal whose password we are 104 krb5_principal principal, 113 ret = kadm5_check_min_life(server_handle, principal, NULL, 0); 116 return kadm5_randkey_principal_3(server_handle, principal, 59 chpass_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument 103 randkey_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_repository.h | 45 char *principal; member in struct:krb5_repository_data
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | validate.c | 108 * Check if a principal is valid. 115 __dh_validate_principal(dh_principal principal) argument
|
H A D | cred.c | 42 * __dh_gss_acquire_cred: Get the credential associated with principal 46 * Note in Diffie-Hellman the supplied principal name must be that of 56 gss_name_t principal, /* Requested principal */ 93 /* Get the principal name of the caller */ 98 * Diffie-Hellman requires the principal to be the principal 102 if (principal && 103 strncmp(netname, (char *)principal, MAXNETNAMELEN) != 0) { 119 dh_cred->principal 54 __dh_gss_acquire_cred(void *ctx, OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument [all...] |
H A D | context_establish.c | 234 strcmp(*netname, cred->principal) != 0) { 367 gss_name_t *principal, /* Initiator name */ 394 if (principal) 395 *principal = NULL; 416 /* Valdidate the local credentinal and retrieve then principal name */ 541 /* Return the remote principal if requested */ 542 if (principal) 543 *principal = (gss_name_t)strdup(g_cntx->remote); 666 dh_principal netname, /* Local principal */ 667 dh_principal target, /* Remote principal */ 360 __dh_gss_accept_sec_context(void *ctx, OM_uint32 *minor, gss_ctx_id_t *gss_ctx, gss_cred_id_t cred, gss_buffer_t input, gss_channel_bindings_t channel, gss_name_t *principal, gss_OID* mech, gss_buffer_t output, OM_uint32 *flags, OM_uint32 *expire, gss_cred_id_t *del_cred ) argument [all...] |
H A D | dh_gssapi.h | 69 * with this principal and a remote principal. For algorithm 0 95 * This entry point is used to see if the principal's credentials 100 * This entry point will return the netname of the calling principal. 106 * Diffie-Hellman principal names are just null terminated charater strings 113 uid_t uid; /* The uid of this principal */ 115 dh_principal principal; /* RPC netname */ member in struct:dh_cred_id_desc
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | read_servi.c | 40 * routine opens the keytab and finds the principal associated with 41 * principal, vno, and enctype and returns the resulting key in *key 47 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 70 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
|
H A D | ktfns.c | 54 krb5_const_principal principal, krb5_kvno vno, 60 if (krb5_is_referral_realm(&principal->realm)) { 62 princ_data = *principal; 63 principal = &princ_data; 70 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype, 72 if (principal == &princ_data) 53 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
H A D | kt_srvtab.c | 187 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 209 best_entry.principal = 0; 214 if (krb5_principal_compare(context, principal, ent.principal)) { 216 if (!best_entry.principal || (best_entry.vno < ent.vno)) { 233 if (best_entry.principal) 475 &ret_entry->principal); 485 krb5_free_principal(context, ret_entry->principal);
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | ser_princ.c | 70 krb5_principal principal; 82 principal = (krb5_principal) arg; 83 if ((principal) && 84 !(kret = krb5_unparse_name(kcontext, principal, &fname))) { 100 krb5_principal principal; 111 principal = (krb5_principal) arg; 112 if (principal) { 116 if (!(kret = krb5_unparse_name(kcontext, principal, &fname))) { 143 krb5_principal principal; 171 /* Parse the name to a principal structur 69 krb5_principal principal; local 98 krb5_principal principal; local 140 krb5_principal principal; local [all...] |
H A D | parse.c | 35 * characters in the principal name. 43 * multi-part principal format used in the protocols. 45 * principal will point to allocated storage which should be freed by 89 krb5_principal principal; local 98 * enterprise principal names (UPNs), there is only a single 152 * Now, we allocate the principal structure and all of its 155 principal = (krb5_principal)MALLOC(sizeof(krb5_principal_data)); 156 if (principal == NULL) { 159 principal->data = (krb5_data *)MALLOC(sizeof(krb5_data) * components); 160 if (principal [all...] |
H A D | unparse.c | 34 * Rewritten by Theodore Ts'o to properly unparse principal names 68 * converts the multi-part principal format used in the protocols to a 80 * KRB_PARSE_MALFORMED principal is invalid (does not contain 154 /* Heimdal escapes spaces in principal names upon unparsing */ 174 k5_unparse_name(krb5_context context, krb5_const_principal principal, argument 192 if (!principal || !name) 207 if (krb5_realm_compare(context, &p, principal)) 213 principal), 218 nelem = krb5_princ_size(context, principal); 222 cp = krb5_princ_component(context, principal, 288 krb5_unparse_name(krb5_context context, krb5_const_principal principal, register char **name) argument 297 krb5_unparse_name_ext(krb5_context context, krb5_const_principal principal, char **name, unsigned int *size) argument 304 krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument 313 krb5_unparse_name_flags_ext(krb5_context context, krb5_const_principal principal, int flags, char **name, unsigned int *size) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 47 krb5_principal principal) 49 return cache->ops->init(context, cache, principal); 119 krb5_principal *principal) 121 return cache->ops->get_princ(context, cache, principal); 46 krb5_cc_initialize(krb5_context context, krb5_ccache cache, krb5_principal principal) argument 118 krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument
|
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kadm5_create.c | 62 krb5_principal principal, int attrs, int lifetime); 185 * printed. If any of these existing principal do not have the proper 194 * The kadmin/admin principal is unused on Solaris. This principal is used 244 * creator (r) principal to use as "mod_by" 246 * principal (r) kerberos principal to add 247 * attrs (r) principal's attributes 248 * lifetime (r) principal's max life, or 0 250 * exists (r) warning message for principal exist 267 add_admin_princ(void *handle, krb5_context context, krb5_principal principal, int attrs, int lifetime) argument 385 krb5_principal principal; local 401 krb5_principal principal; local [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 139 krb5_principal principal) 180 int i, n = krb5_princ_size(handle->context, principal); 181 cp = krb5_princ_realm(handle->context, principal)->data; 185 cp = krb5_princ_component(handle->context, principal, i)->data; 137 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
|
H A D | server_kdb.c | 113 * r (r) realm of history principal to use, or NULL 118 * hist_princ krb5_principal holding the history principal 119 * hist_db krb5_db_entry of the history principal 120 * hist_key krb5_keyblock holding the history principal's key 124 * If the history principal does not already exist, this function 126 * If the history principal is deleted and this function is executed 128 * the principal will be assigned a new random key and all existing 160 /* try to create the principal */ 164 ent.principal = hist_princ; 169 correct value once the principal i 243 kdb_get_entry(kadm5_server_handle_t handle, krb5_principal principal, krb5_db_entry *kdb, osa_princ_ent_rec *adb) argument [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_compat.h | 68 old_krb5_principal principal; member in struct:_old_krb5_db_entry
|
/illumos-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss_utils.c | 141 * specific principal name (for the user name) in exported form. 144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument 154 *principal = NULL; 223 (*principal) = malloc(plen); 224 if ((*principal) == NULL) { 228 bzero((caddr_t)(*principal), plen); 229 (*principal)->len = RNDUP(name_buf.length); 230 s = (*principal)->name;
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 124 "V5 krbtgt principal "), 204 * krb5_gsscred: Given a kerberos principal try to find the corresponding 209 krb5_gsscred(krb5_principal principal, uid_t *uid) argument 215 name_buf.value = &principal; 216 name_buf.length = sizeof (principal); 219 * Convert the kerb principal in to a gss name 246 * Given a Kerberos principal "principal", and a local username "luser", 256 * a matching principal name, instance, and realm. If one is found, 265 krb5_kuserok(krb5_context context, krb5_principal principal, cons argument [all...] |
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 79 * anyway, we just fill it in with a dummy principal. The server of 141 * anyway, we just fill it in with a dummy principal. The server of 170 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument 178 if(principal == NULL) 180 arg.princ = principal;
|
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | rpcsec_gss_if.c | 154 char *principal, /* server service principal */ 163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism, 177 rpc_gss_principal_t *principal, 185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism, 223 char *principal, /* server service principal name */ 231 return ((*calls.rpc_gss_set_svc_name)(principal, mechanism, req_time, 152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument 222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
|
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | sec_svc.c | 146 sec_svc_getcred(struct svc_req *req, cred_t *cr, caddr_t *principal, argument 159 *principal = NULL; 178 *principal = adc->adc_fullname.name; 192 *principal = (caddr_t)rcred->client_principal; 213 * Load root principal names from user space to kernel space. 216 * count - number of principal names to be loaded 243 * And now copy each individual principal name 338 * Figure out everything we allocated in a root principal name list in 368 * Check if the given principal name is in the root principal lis [all...] |
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_principal.c | 150 krb5_principal principal; local 213 if (krb5_parse_name(context, princ_name, &principal) != 0) 215 if (is_principal_in_realm(ldap_context, principal) == 0) { 216 if ((st = populate_krb5_db_entry(context, ldap_context, ld, ent, principal, 221 (void) krb5_free_principal(context, principal); 226 (void) krb5_free_principal(context, principal); 254 * delete a principal from the directory. 280 /* get the principal info */ 324 * If the Kerberos user principal to be deleted happens to be the last one associated 329 * NOTE: krbsecretkey attribute has per principal entrie [all...] |