Searched defs:principal (Results 1 - 25 of 32) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dset_realm.c35 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) argument
48 (void) free(krb5_princ_realm(context,principal)->data);
50 krb5_princ_realm(context, principal)->length = length;
51 krb5_princ_realm(context, principal)->data = newrealm;
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dvalidate.c108 * Check if a principal is valid.
115 __dh_validate_principal(dh_principal principal) argument
H A Dcred.c35 * __dh_gss_acquire_cred: Get the credential associated with principal
39 * Note in Diffie-Hellman the supplied principal name must be that of
49 gss_name_t principal, /* Requested principal */
84 /* Get the principal name of the caller */
89 * Diffie-Hellman requires the principal to be the principal
93 if (principal &&
94 strncmp(netname, (char *)principal, MAXNETNAMELEN) != 0) {
110 dh_cred->principal
47 __dh_gss_acquire_cred( OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument
[all...]
H A Dcontext_establish.c228 strcmp(*netname, cred->principal) != 0) {
361 gss_name_t *principal, /* Initiator name */
386 if (principal)
387 *principal = NULL;
408 /* Valdidate the local credentinal and retrieve then principal name */
533 /* Return the remote principal if requested */
534 if (principal)
535 *principal = (gss_name_t)strdup(g_cntx->remote);
656 dh_principal netname, /* Local principal */
657 dh_principal target, /* Remote principal */
354 __dh_gss_accept_sec_context( OM_uint32 *minor, gss_ctx_id_t *gss_ctx, gss_cred_id_t cred, gss_buffer_t input, gss_channel_bindings_t channel, gss_name_t *principal, gss_OID* mech, gss_buffer_t output, OM_uint32 *flags, OM_uint32 *expire, gss_cred_id_t *del_cred ) argument
[all...]
H A Ddh_gssapi.h65 * with this principal and a remote principal. For algorithm 0
91 * This entry point is used to see if the principal's credentials
96 * This entry point will return the netname of the calling principal.
102 * Diffie-Hellman principal names are just null terminated charater strings
109 uid_t uid; /* The uid of this principal */
111 dh_principal principal; /* RPC netname */ member in struct:dh_cred_id_desc
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_repository.h45 char *principal; member in struct:krb5_repository_data
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dread_servi.c42 * routine opens the keytab and finds the principal associated with
43 * principal, vno, and enctype and returns the resulting key in *key
49 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument
72 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
H A Dktfns.c57 krb5_const_principal principal, krb5_kvno vno,
63 if (krb5_is_referral_realm(&principal->realm)) {
65 princ_data = *principal;
66 principal = &princ_data;
73 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype,
75 if (principal == &princ_data)
56 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
H A Dkt_memory.c52 * krb5_principal principal; principal of this key
383 krb5_const_principal principal, krb5_kvno kvno,
399 /* if the principal isn't the one requested, continue to the next. */
401 if (!krb5_principal_compare(context, principal, entry->principal))
449 match->principal,
450 &(out_entry->principal));
522 err = krb5_copy_principal(context, mkt_cursor->entry->principal,
523 &(entry->principal));
382 krb5_mkt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *out_entry) argument
[all...]
H A Dkt_srvtab.c166 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
188 best_entry.principal = 0;
193 if (krb5_principal_compare(context, principal, ent.principal)) {
195 if (!best_entry.principal || (best_entry.vno < ent.vno)) {
212 if (best_entry.principal)
445 &ret_entry->principal);
455 krb5_free_principal(context, ret_entry->principal);
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_xdr.c37 krb5_const_principal principal)
42 if (!(retval = krb5_unparse_name(context, principal, &princ_name))) {
82 * then XX bytes [ 2 for length + length for string ] for the principal,
183 * Now we get to the principal.
330 * Get the principal name for the entry
36 krb5_encode_princ_dbkey(krb5_context context, krb5_data *key, krb5_const_principal principal) argument
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c138 krb5_principal principal)
179 int i, n = krb5_princ_size(handle->context, principal);
180 cp = krb5_princ_realm(handle->context, principal)->data;
184 cp = krb5_princ_component(handle->context, principal, i)->data;
136 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
H A Dserver_kdb.c129 * r (r) realm of history principal to use, or NULL
132 * the history principal does not already exist, this function attempts to
163 /* Create the history principal. */
165 ent.principal = hist_princ;
179 ret = kadm5_randkey_principal_3(handle, ent.principal, 0, 1, ks,
205 * Effects: This function looks up the history principal and retrieves the
252 * principal (r) the principal to get
263 krb5_principal principal, krb5_db_entry *kdb,
272 ret = krb5_db_get_principal(handle->context, principal, kd
262 kdb_get_entry(kadm5_server_handle_t handle, krb5_principal principal, krb5_db_entry *kdb, osa_princ_ent_rec *adb) argument
[all...]
/osnet-11/usr/src/lib/libnsl/rpc/
H A Drpcsec_gss_if.c154 char *principal, /* server service principal */
163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism,
177 rpc_gss_principal_t *principal,
185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism,
223 char *principal, /* server service principal name */
231 return ((*calls.rpc_gss_set_svc_name)(principal, mechanism, req_time,
152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument
222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dccfns.c48 krb5_principal principal)
50 return cache->ops->init(context, cache, principal);
125 krb5_principal *principal)
127 return cache->ops->get_princ(context, cache, principal);
200 krb5_const_principal principal,
213 if (principal) {
214 ret = krb5_unparse_name(context, principal, &pname);
234 * \param principal principal to check if it a configuration principal
47 krb5_cc_initialize(krb5_context context, krb5_ccache cache, krb5_principal principal) argument
124 krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument
199 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument
243 krb5_is_config_principal(krb5_context context, krb5_const_principal principal) argument
277 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument
321 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dkuserok.c122 "V5 krbtgt principal "),
201 * krb5_gsscred: Given a kerberos principal try to find the corresponding
206 krb5_gsscred(krb5_principal principal, uid_t *uid) argument
212 name_buf.value = &principal;
213 name_buf.length = sizeof (principal);
216 * Convert the kerb principal in to a gss name
243 * Given a Kerberos principal "principal", and a local username "luser",
253 * a matching principal name, instance, and realm. If one is found,
262 krb5_kuserok(krb5_context context, krb5_principal principal, cons argument
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_principal.c133 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument
141 if(principal == NULL)
143 arg.princ = principal;
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_principal.c148 krb5_principal principal; local
210 if (krb5_parse_name(context, princ_name, &principal) != 0)
212 if (is_principal_in_realm(ldap_context, principal) == 0) {
213 if ((st = populate_krb5_db_entry(context, ldap_context, ld, ent, principal,
218 (void) krb5_free_principal(context, principal);
222 (void) krb5_free_principal(context, principal);
245 * delete a principal from the directory.
268 /* get the principal info */
312 * If the Kerberos user principal to be deleted happens to be the last one associated
317 * NOTE: krbsecretkey attribute has per principal entrie
[all...]
H A Dldap_realm.c143 principal_in_realm_2(krb5_principal principal, char *realm) { argument
145 if (principal->length == 2 &&
146 principal->data[0].length == sizeof ("krbtgt") &&
147 strncasecmp (principal->data[0].data, "krbtgt", sizeof ("krbtgt")) &&
148 principal->data[1].length == strlen (realm) &&
149 strncasecmp (principal->data[1].data, realm, strlen (realm)))
152 if (strlen(realm) != principal->realm.length)
155 if (strncasecmp(realm, principal->realm.data, principal->realm.length) != 0)
260 krb5_principal principal; local
[all...]
/osnet-11/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss_utils.c141 * specific principal name (for the user name) in exported form.
144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument
154 *principal = NULL;
223 (*principal) = malloc(plen);
224 if ((*principal) == NULL) {
228 bzero((caddr_t)(*principal), plen);
229 (*principal)->len = RNDUP(name_buf.length);
230 s = (*principal)->name;
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_util.c313 char *principal; local
316 if (asprintf(&principal, "%s@%s", ctx->ct_user, ctx->ct_realm) == -1)
319 DPRINT("user=%s, principal=%s, request=0x%08x",
320 ctx->ct_user, principal, ctx->ct_rflags);
321 rc = (force) ? smb_kinit_force(principal, ctx->ct_password) :
322 smb_kinit(principal, ctx->ct_password);
324 free(principal);
327 free(principal);
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_krb.c583 * Obtain and cache an initial TGT ticket for the specified principal.
585 * principal name with a NULL password. In the latter case, keys for the
586 * specified service principal will be looked up from the local keytab
589 * For kinit to work in multiple realms environment, the principal name must be
592 * The validate flag determines if validation of specified principal is
635 action = "smbns_krb: parsing principal name";
702 * Obtain and cache an initial TGT ticket for the specified principal.
704 * Force kinit on the specified principal without validating the cache.
713 * Obtain and cache an initial TGT ticket for the specified principal.
715 * Validate the cache for the specified principal
883 smb_krb5_ccache_isvalid(const char *path, char *principal) argument
[all...]
/osnet-11/usr/src/lib/libnsl/nis/gen/
H A Dnis_subr.c135 char principal[LN_BUFSIZE]; member in struct:principal_list
192 * domainname for the host principal name.
485 * Generate the principal name for this host, "hostname"+"domainname"
/osnet-11/usr/src/lib/libntsvcs/common/
H A Dntsvcs_clnt.c245 char *principal = NULL; local
258 if (asprintf(&principal, "%s@%s", sam_acct, realm) == -1)
260 rc = smb_kinit(principal, NULL);
266 if (asprintf(&principal, "%s@%s", username, realm) == -1)
268 rc = smb_kinit(principal, (char *)passwd);
272 syslog(LOG_DEBUG, "ndr_rpc_bind: kinit failed(%s)", principal);
274 free(principal);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dkrb5_decode.c78 * Allocate a principal and initialize enough fields for
1066 krb5_principal *principal)
1070 *principal = NULL;
1072 retval = asn1_decode_setpw_req(&buf, rep, principal);
1065 decode_krb5_setpw_req(const krb5_data *code, krb5_data **repptr, krb5_principal *principal) argument

Completed in 71 milliseconds

12