Searched defs:principal (Results 1 - 25 of 38) sorted by relevance

12

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dset_realm.c34 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) argument
48 (void) krb5_xfree(krb5_princ_realm(context,principal)->data);
50 krb5_princ_realm(context, principal)->length = length;
51 krb5_princ_realm(context, principal)->data = newrealm;
/illumos-gate/usr/src/cmd/krb5/kadmin/server/
H A Dserver_glue_v1.c41 krb5_principal principal,
44 return kadm5_get_principal(server_handle, principal,(kadm5_principal_ent_t) ent, 0);
40 kadm5_get_principal_v1(void *server_handle, krb5_principal principal, kadm5_principal_ent_t_v1 *ent) argument
H A Dmisc.c41 * principal (input) krb5_principals whose password we are
60 krb5_principal principal,
69 ret = kadm5_check_min_life(server_handle, principal, NULL, 0);
73 return kadm5_chpass_principal_3(server_handle, principal,
86 * principal (input) krb5_principal whose password we are
104 krb5_principal principal,
113 ret = kadm5_check_min_life(server_handle, principal, NULL, 0);
116 return kadm5_randkey_principal_3(server_handle, principal,
59 chpass_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
103 randkey_principal_wrapper_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_repository.h45 char *principal; member in struct:krb5_repository_data
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dvalidate.c108 * Check if a principal is valid.
115 __dh_validate_principal(dh_principal principal) argument
H A Dcred.c42 * __dh_gss_acquire_cred: Get the credential associated with principal
46 * Note in Diffie-Hellman the supplied principal name must be that of
56 gss_name_t principal, /* Requested principal */
93 /* Get the principal name of the caller */
98 * Diffie-Hellman requires the principal to be the principal
102 if (principal &&
103 strncmp(netname, (char *)principal, MAXNETNAMELEN) != 0) {
119 dh_cred->principal
54 __dh_gss_acquire_cred(void *ctx, OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument
[all...]
H A Dcontext_establish.c234 strcmp(*netname, cred->principal) != 0) {
367 gss_name_t *principal, /* Initiator name */
394 if (principal)
395 *principal = NULL;
416 /* Valdidate the local credentinal and retrieve then principal name */
541 /* Return the remote principal if requested */
542 if (principal)
543 *principal = (gss_name_t)strdup(g_cntx->remote);
666 dh_principal netname, /* Local principal */
667 dh_principal target, /* Remote principal */
360 __dh_gss_accept_sec_context(void *ctx, OM_uint32 *minor, gss_ctx_id_t *gss_ctx, gss_cred_id_t cred, gss_buffer_t input, gss_channel_bindings_t channel, gss_name_t *principal, gss_OID* mech, gss_buffer_t output, OM_uint32 *flags, OM_uint32 *expire, gss_cred_id_t *del_cred ) argument
[all...]
H A Ddh_gssapi.h69 * with this principal and a remote principal. For algorithm 0
95 * This entry point is used to see if the principal's credentials
100 * This entry point will return the netname of the calling principal.
106 * Diffie-Hellman principal names are just null terminated charater strings
113 uid_t uid; /* The uid of this principal */
115 dh_principal principal; /* RPC netname */ member in struct:dh_cred_id_desc
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dread_servi.c40 * routine opens the keytab and finds the principal associated with
41 * principal, vno, and enctype and returns the resulting key in *key
47 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument
70 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
H A Dktfns.c54 krb5_const_principal principal, krb5_kvno vno,
60 if (krb5_is_referral_realm(&principal->realm)) {
62 princ_data = *principal;
63 principal = &princ_data;
70 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype,
72 if (principal == &princ_data)
53 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
H A Dkt_srvtab.c187 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
209 best_entry.principal = 0;
214 if (krb5_principal_compare(context, principal, ent.principal)) {
216 if (!best_entry.principal || (best_entry.vno < ent.vno)) {
233 if (best_entry.principal)
475 &ret_entry->principal);
485 krb5_free_principal(context, ret_entry->principal);
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dser_princ.c70 krb5_principal principal;
82 principal = (krb5_principal) arg;
83 if ((principal) &&
84 !(kret = krb5_unparse_name(kcontext, principal, &fname))) {
100 krb5_principal principal;
111 principal = (krb5_principal) arg;
112 if (principal) {
116 if (!(kret = krb5_unparse_name(kcontext, principal, &fname))) {
143 krb5_principal principal;
171 /* Parse the name to a principal structur
69 krb5_principal principal; local
98 krb5_principal principal; local
140 krb5_principal principal; local
[all...]
H A Dparse.c35 * characters in the principal name.
43 * multi-part principal format used in the protocols.
45 * principal will point to allocated storage which should be freed by
89 krb5_principal principal; local
98 * enterprise principal names (UPNs), there is only a single
152 * Now, we allocate the principal structure and all of its
155 principal = (krb5_principal)MALLOC(sizeof(krb5_principal_data));
156 if (principal == NULL) {
159 principal->data = (krb5_data *)MALLOC(sizeof(krb5_data) * components);
160 if (principal
[all...]
H A Dunparse.c34 * Rewritten by Theodore Ts'o to properly unparse principal names
68 * converts the multi-part principal format used in the protocols to a
80 * KRB_PARSE_MALFORMED principal is invalid (does not contain
154 /* Heimdal escapes spaces in principal names upon unparsing */
174 k5_unparse_name(krb5_context context, krb5_const_principal principal, argument
192 if (!principal || !name)
207 if (krb5_realm_compare(context, &p, principal))
213 principal),
218 nelem = krb5_princ_size(context, principal);
222 cp = krb5_princ_component(context, principal,
288 krb5_unparse_name(krb5_context context, krb5_const_principal principal, register char **name) argument
297 krb5_unparse_name_ext(krb5_context context, krb5_const_principal principal, char **name, unsigned int *size) argument
304 krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument
313 krb5_unparse_name_flags_ext(krb5_context context, krb5_const_principal principal, int flags, char **name, unsigned int *size) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dccfns.c47 krb5_principal principal)
49 return cache->ops->init(context, cache, principal);
119 krb5_principal *principal)
121 return cache->ops->get_princ(context, cache, principal);
46 krb5_cc_initialize(krb5_context context, krb5_ccache cache, krb5_principal principal) argument
118 krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/
H A Dkadm5_create.c62 krb5_principal principal, int attrs, int lifetime);
185 * printed. If any of these existing principal do not have the proper
194 * The kadmin/admin principal is unused on Solaris. This principal is used
244 * creator (r) principal to use as "mod_by"
246 * principal (r) kerberos principal to add
247 * attrs (r) principal's attributes
248 * lifetime (r) principal's max life, or 0
250 * exists (r) warning message for principal exist
267 add_admin_princ(void *handle, krb5_context context, krb5_principal principal, int attrs, int lifetime) argument
385 krb5_principal principal; local
401 krb5_principal principal; local
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c139 krb5_principal principal)
180 int i, n = krb5_princ_size(handle->context, principal);
181 cp = krb5_princ_realm(handle->context, principal)->data;
185 cp = krb5_princ_component(handle->context, principal, i)->data;
137 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
H A Dserver_kdb.c113 * r (r) realm of history principal to use, or NULL
118 * hist_princ krb5_principal holding the history principal
119 * hist_db krb5_db_entry of the history principal
120 * hist_key krb5_keyblock holding the history principal's key
124 * If the history principal does not already exist, this function
126 * If the history principal is deleted and this function is executed
128 * the principal will be assigned a new random key and all existing
160 /* try to create the principal */
164 ent.principal = hist_princ;
169 correct value once the principal i
243 kdb_get_entry(kadm5_server_handle_t handle, krb5_principal principal, krb5_db_entry *kdb, osa_princ_ent_rec *adb) argument
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_compat.h68 old_krb5_principal principal; member in struct:_old_krb5_db_entry
/illumos-gate/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss_utils.c141 * specific principal name (for the user name) in exported form.
144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument
154 *principal = NULL;
223 (*principal) = malloc(plen);
224 if ((*principal) == NULL) {
228 bzero((caddr_t)(*principal), plen);
229 (*principal)->len = RNDUP(name_buf.length);
230 s = (*principal)->name;
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dkuserok.c124 "V5 krbtgt principal "),
204 * krb5_gsscred: Given a kerberos principal try to find the corresponding
209 krb5_gsscred(krb5_principal principal, uid_t *uid) argument
215 name_buf.value = &principal;
216 name_buf.length = sizeof (principal);
219 * Convert the kerb principal in to a gss name
246 * Given a Kerberos principal "principal", and a local username "luser",
256 * a matching principal name, instance, and realm. If one is found,
265 krb5_kuserok(krb5_context context, krb5_principal principal, cons argument
[all...]
/illumos-gate/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_principal.c79 * anyway, we just fill it in with a dummy principal. The server of
141 * anyway, we just fill it in with a dummy principal. The server of
170 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument
178 if(principal == NULL)
180 arg.princ = principal;
/illumos-gate/usr/src/lib/libnsl/rpc/
H A Drpcsec_gss_if.c154 char *principal, /* server service principal */
163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism,
177 rpc_gss_principal_t *principal,
185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism,
223 char *principal, /* server service principal name */
231 return ((*calls.rpc_gss_set_svc_name)(principal, mechanism, req_time,
152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument
222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dsec_svc.c146 sec_svc_getcred(struct svc_req *req, cred_t *cr, caddr_t *principal, argument
159 *principal = NULL;
178 *principal = adc->adc_fullname.name;
192 *principal = (caddr_t)rcred->client_principal;
213 * Load root principal names from user space to kernel space.
216 * count - number of principal names to be loaded
243 * And now copy each individual principal name
338 * Figure out everything we allocated in a root principal name list in
368 * Check if the given principal name is in the root principal lis
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_principal.c150 krb5_principal principal; local
213 if (krb5_parse_name(context, princ_name, &principal) != 0)
215 if (is_principal_in_realm(ldap_context, principal) == 0) {
216 if ((st = populate_krb5_db_entry(context, ldap_context, ld, ent, principal,
221 (void) krb5_free_principal(context, principal);
226 (void) krb5_free_principal(context, principal);
254 * delete a principal from the directory.
280 /* get the principal info */
324 * If the Kerberos user principal to be deleted happens to be the last one associated
329 * NOTE: krbsecretkey attribute has per principal entrie
[all...]

Completed in 100 milliseconds

12