/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | set_realm.c | 35 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) argument 48 (void) free(krb5_princ_realm(context,principal)->data); 50 krb5_princ_realm(context, principal)->length = length; 51 krb5_princ_realm(context, principal)->data = newrealm;
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | validate.c | 108 * Check if a principal is valid. 115 __dh_validate_principal(dh_principal principal) argument
|
H A D | cred.c | 35 * __dh_gss_acquire_cred: Get the credential associated with principal 39 * Note in Diffie-Hellman the supplied principal name must be that of 49 gss_name_t principal, /* Requested principal */ 84 /* Get the principal name of the caller */ 89 * Diffie-Hellman requires the principal to be the principal 93 if (principal && 94 strncmp(netname, (char *)principal, MAXNETNAMELEN) != 0) { 110 dh_cred->principal 47 __dh_gss_acquire_cred( OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument [all...] |
H A D | context_establish.c | 228 strcmp(*netname, cred->principal) != 0) { 361 gss_name_t *principal, /* Initiator name */ 386 if (principal) 387 *principal = NULL; 408 /* Valdidate the local credentinal and retrieve then principal name */ 533 /* Return the remote principal if requested */ 534 if (principal) 535 *principal = (gss_name_t)strdup(g_cntx->remote); 656 dh_principal netname, /* Local principal */ 657 dh_principal target, /* Remote principal */ 354 __dh_gss_accept_sec_context( OM_uint32 *minor, gss_ctx_id_t *gss_ctx, gss_cred_id_t cred, gss_buffer_t input, gss_channel_bindings_t channel, gss_name_t *principal, gss_OID* mech, gss_buffer_t output, OM_uint32 *flags, OM_uint32 *expire, gss_cred_id_t *del_cred ) argument [all...] |
H A D | dh_gssapi.h | 65 * with this principal and a remote principal. For algorithm 0 91 * This entry point is used to see if the principal's credentials 96 * This entry point will return the netname of the calling principal. 102 * Diffie-Hellman principal names are just null terminated charater strings 109 uid_t uid; /* The uid of this principal */ 111 dh_principal principal; /* RPC netname */ member in struct:dh_cred_id_desc
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_repository.h | 45 char *principal; member in struct:krb5_repository_data
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | read_servi.c | 42 * routine opens the keytab and finds the principal associated with 43 * principal, vno, and enctype and returns the resulting key in *key 49 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 72 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
|
H A D | ktfns.c | 57 krb5_const_principal principal, krb5_kvno vno, 63 if (krb5_is_referral_realm(&principal->realm)) { 65 princ_data = *principal; 66 principal = &princ_data; 73 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype, 75 if (principal == &princ_data) 56 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
H A D | kt_memory.c | 52 * krb5_principal principal; principal of this key 383 krb5_const_principal principal, krb5_kvno kvno, 399 /* if the principal isn't the one requested, continue to the next. */ 401 if (!krb5_principal_compare(context, principal, entry->principal)) 449 match->principal, 450 &(out_entry->principal)); 522 err = krb5_copy_principal(context, mkt_cursor->entry->principal, 523 &(entry->principal)); 382 krb5_mkt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *out_entry) argument [all...] |
H A D | kt_srvtab.c | 166 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 188 best_entry.principal = 0; 193 if (krb5_principal_compare(context, principal, ent.principal)) { 195 if (!best_entry.principal || (best_entry.vno < ent.vno)) { 212 if (best_entry.principal) 445 &ret_entry->principal); 455 krb5_free_principal(context, ret_entry->principal);
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_xdr.c | 37 krb5_const_principal principal) 42 if (!(retval = krb5_unparse_name(context, principal, &princ_name))) { 82 * then XX bytes [ 2 for length + length for string ] for the principal, 183 * Now we get to the principal. 330 * Get the principal name for the entry 36 krb5_encode_princ_dbkey(krb5_context context, krb5_data *key, krb5_const_principal principal) argument
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 138 krb5_principal principal) 179 int i, n = krb5_princ_size(handle->context, principal); 180 cp = krb5_princ_realm(handle->context, principal)->data; 184 cp = krb5_princ_component(handle->context, principal, i)->data; 136 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
|
H A D | server_kdb.c | 129 * r (r) realm of history principal to use, or NULL 132 * the history principal does not already exist, this function attempts to 163 /* Create the history principal. */ 165 ent.principal = hist_princ; 179 ret = kadm5_randkey_principal_3(handle, ent.principal, 0, 1, ks, 205 * Effects: This function looks up the history principal and retrieves the 252 * principal (r) the principal to get 263 krb5_principal principal, krb5_db_entry *kdb, 272 ret = krb5_db_get_principal(handle->context, principal, kd 262 kdb_get_entry(kadm5_server_handle_t handle, krb5_principal principal, krb5_db_entry *kdb, osa_princ_ent_rec *adb) argument [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | rpcsec_gss_if.c | 154 char *principal, /* server service principal */ 163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism, 177 rpc_gss_principal_t *principal, 185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism, 223 char *principal, /* server service principal name */ 231 return ((*calls.rpc_gss_set_svc_name)(principal, mechanism, req_time, 152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument 222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 48 krb5_principal principal) 50 return cache->ops->init(context, cache, principal); 125 krb5_principal *principal) 127 return cache->ops->get_princ(context, cache, principal); 200 krb5_const_principal principal, 213 if (principal) { 214 ret = krb5_unparse_name(context, principal, &pname); 234 * \param principal principal to check if it a configuration principal 47 krb5_cc_initialize(krb5_context context, krb5_ccache cache, krb5_principal principal) argument 124 krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument 199 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument 243 krb5_is_config_principal(krb5_context context, krb5_const_principal principal) argument 277 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument 321 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 122 "V5 krbtgt principal "), 201 * krb5_gsscred: Given a kerberos principal try to find the corresponding 206 krb5_gsscred(krb5_principal principal, uid_t *uid) argument 212 name_buf.value = &principal; 213 name_buf.length = sizeof (principal); 216 * Convert the kerb principal in to a gss name 243 * Given a Kerberos principal "principal", and a local username "luser", 253 * a matching principal name, instance, and realm. If one is found, 262 krb5_kuserok(krb5_context context, krb5_principal principal, cons argument [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_principal.c | 133 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument 141 if(principal == NULL) 143 arg.princ = principal;
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_principal.c | 148 krb5_principal principal; local 210 if (krb5_parse_name(context, princ_name, &principal) != 0) 212 if (is_principal_in_realm(ldap_context, principal) == 0) { 213 if ((st = populate_krb5_db_entry(context, ldap_context, ld, ent, principal, 218 (void) krb5_free_principal(context, principal); 222 (void) krb5_free_principal(context, principal); 245 * delete a principal from the directory. 268 /* get the principal info */ 312 * If the Kerberos user principal to be deleted happens to be the last one associated 317 * NOTE: krbsecretkey attribute has per principal entrie [all...] |
H A D | ldap_realm.c | 143 principal_in_realm_2(krb5_principal principal, char *realm) { argument 145 if (principal->length == 2 && 146 principal->data[0].length == sizeof ("krbtgt") && 147 strncasecmp (principal->data[0].data, "krbtgt", sizeof ("krbtgt")) && 148 principal->data[1].length == strlen (realm) && 149 strncasecmp (principal->data[1].data, realm, strlen (realm))) 152 if (strlen(realm) != principal->realm.length) 155 if (strncasecmp(realm, principal->realm.data, principal->realm.length) != 0) 260 krb5_principal principal; local [all...] |
/osnet-11/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss_utils.c | 141 * specific principal name (for the user name) in exported form. 144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument 154 *principal = NULL; 223 (*principal) = malloc(plen); 224 if ((*principal) == NULL) { 228 bzero((caddr_t)(*principal), plen); 229 (*principal)->len = RNDUP(name_buf.length); 230 s = (*principal)->name;
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_util.c | 313 char *principal; local 316 if (asprintf(&principal, "%s@%s", ctx->ct_user, ctx->ct_realm) == -1) 319 DPRINT("user=%s, principal=%s, request=0x%08x", 320 ctx->ct_user, principal, ctx->ct_rflags); 321 rc = (force) ? smb_kinit_force(principal, ctx->ct_password) : 322 smb_kinit(principal, ctx->ct_password); 324 free(principal); 327 free(principal);
|
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_krb.c | 583 * Obtain and cache an initial TGT ticket for the specified principal. 585 * principal name with a NULL password. In the latter case, keys for the 586 * specified service principal will be looked up from the local keytab 589 * For kinit to work in multiple realms environment, the principal name must be 592 * The validate flag determines if validation of specified principal is 635 action = "smbns_krb: parsing principal name"; 702 * Obtain and cache an initial TGT ticket for the specified principal. 704 * Force kinit on the specified principal without validating the cache. 713 * Obtain and cache an initial TGT ticket for the specified principal. 715 * Validate the cache for the specified principal 883 smb_krb5_ccache_isvalid(const char *path, char *principal) argument [all...] |
/osnet-11/usr/src/lib/libnsl/nis/gen/ |
H A D | nis_subr.c | 135 char principal[LN_BUFSIZE]; member in struct:principal_list 192 * domainname for the host principal name. 485 * Generate the principal name for this host, "hostname"+"domainname"
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | ntsvcs_clnt.c | 245 char *principal = NULL; local 258 if (asprintf(&principal, "%s@%s", sam_acct, realm) == -1) 260 rc = smb_kinit(principal, NULL); 266 if (asprintf(&principal, "%s@%s", username, realm) == -1) 268 rc = smb_kinit(principal, (char *)passwd); 272 syslog(LOG_DEBUG, "ndr_rpc_bind: kinit failed(%s)", principal); 274 free(principal);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | krb5_decode.c | 78 * Allocate a principal and initialize enough fields for 1066 krb5_principal *principal) 1070 *principal = NULL; 1072 retval = asn1_decode_setpw_req(&buf, rep, principal); 1065 decode_krb5_setpw_req(const krb5_data *code, krb5_data **repptr, krb5_principal *principal) argument
|