Searched refs:principal (Results 1 - 25 of 55) sorted by relevance

123

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dset_realm.c35 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) argument
48 (void) free(krb5_princ_realm(context,principal)->data);
50 krb5_princ_realm(context, principal)->length = length;
51 krb5_princ_realm(context, principal)->data = newrealm;
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_repository.h45 char *principal; member in struct:krb5_repository_data
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_findrealm.c29 * the components of a principal (princ) but match on any realm. When a
51 memcpy(&tmp_realm, &ent.principal->realm, sizeof (krb5_data));
52 memcpy(&ent.principal->realm, &princ->realm,
55 match = krb5_principal_compare(context, ent.principal, princ);
58 memcpy(&ent.principal->realm, &tmp_realm, sizeof (krb5_data));
66 &ent.principal->realm, realm);
H A Dktfr_entry.c40 krb5_free_principal(context, entry->principal);
H A Dktfns.c57 krb5_const_principal principal, krb5_kvno vno,
63 if (krb5_is_referral_realm(&principal->realm)) {
65 princ_data = *principal;
66 principal = &princ_data;
73 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype,
75 if (principal == &princ_data)
56 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
H A Dread_servi.c42 * routine opens the keytab and finds the principal associated with
43 * principal, vno, and enctype and returns the resulting key in *key
49 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument
72 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
H A Dkt_file.c262 krb5_const_principal principal, krb5_kvno kvno,
297 cur_entry.principal = 0;
309 /* if the principal isn't the one requested, free new_entry
319 if (!krb5_principal_compare_flags(context, principal,
320 new_entry.principal,
325 } else if (!krb5_principal_compare(context, principal,
326 new_entry.principal)) {
374 if (! cur_entry.principal ||
403 if (cur_entry.principal)
902 krb5_principal_compare(context, entry->principal, cur_entr
261 krb5_ktfile_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
[all...]
H A Dkt_memory.c52 * krb5_principal principal; principal of this key
383 krb5_const_principal principal, krb5_kvno kvno,
399 /* if the principal isn't the one requested, continue to the next. */
401 if (!krb5_principal_compare(context, principal, entry->principal))
449 match->principal,
450 &(out_entry->principal));
522 err = krb5_copy_principal(context, mkt_cursor->entry->principal,
523 &(entry->principal));
382 krb5_mkt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *out_entry) argument
[all...]
H A Dkt_srvtab.c166 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
188 best_entry.principal = 0;
193 if (krb5_principal_compare(context, principal, ent.principal)) {
195 if (!best_entry.principal || (best_entry.vno < ent.vno)) {
212 if (best_entry.principal)
445 &ret_entry->principal);
455 krb5_free_principal(context, ret_entry->principal);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dkuserok.c122 "V5 krbtgt principal "),
201 * krb5_gsscred: Given a kerberos principal try to find the corresponding
206 krb5_gsscred(krb5_principal principal, uid_t *uid) argument
212 name_buf.value = &principal;
213 name_buf.length = sizeof (principal);
216 * Convert the kerb principal in to a gss name
243 * Given a Kerberos principal "principal", and a local username "luser",
253 * a matching principal name, instance, and realm. If one is found,
262 krb5_kuserok(krb5_context context, krb5_principal principal, cons argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dccfns.c48 krb5_principal principal)
50 return cache->ops->init(context, cache, principal);
125 krb5_principal *principal)
127 return cache->ops->get_princ(context, cache, principal);
200 krb5_const_principal principal,
213 if (principal) {
214 ret = krb5_unparse_name(context, principal, &pname);
234 * \param principal principal to check if it a configuration principal
47 krb5_cc_initialize(krb5_context context, krb5_ccache cache, krb5_principal principal) argument
124 krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument
199 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument
243 krb5_is_config_principal(krb5_context context, krb5_const_principal principal) argument
277 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument
321 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_xdr.h9 krb5_const_principal principal);
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_xdr.h10 krb5_const_principal principal);
H A Dldap_principal.c148 krb5_principal principal; local
210 if (krb5_parse_name(context, princ_name, &principal) != 0)
212 if (is_principal_in_realm(ldap_context, principal) == 0) {
213 if ((st = populate_krb5_db_entry(context, ldap_context, ld, ent, principal,
218 (void) krb5_free_principal(context, principal);
222 (void) krb5_free_principal(context, principal);
245 * delete a principal from the directory.
268 /* get the principal info */
312 * If the Kerberos user principal to be deleted happens to be the last one associated
317 * NOTE: krbsecretkey attribute has per principal entrie
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcred.c35 * __dh_gss_acquire_cred: Get the credential associated with principal
39 * Note in Diffie-Hellman the supplied principal name must be that of
49 gss_name_t principal, /* Requested principal */
84 /* Get the principal name of the caller */
89 * Diffie-Hellman requires the principal to be the principal
93 if (principal &&
94 strncmp(netname, (char *)principal, MAXNETNAMELEN) != 0) {
110 dh_cred->principal
47 __dh_gss_acquire_cred( OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument
[all...]
H A Dvalidate.c108 * Check if a principal is valid.
115 __dh_validate_principal(dh_principal principal) argument
/osnet-11/usr/src/lib/krb5/kdb/
H A Dkeytab.c119 krb5_ktkdb_get_entry(in_context, id, principal, kvno, enctype, entry)
122 krb5_const_principal principal;
141 xrealm_tgt = is_xrealm_tgt(context, principal);
148 kerror = krb5_db_get_principal(context, principal, &
202 kerror = krb5_copy_principal(context, principal, &entry->principal);
214 * is_xrealm_tgt: Returns true if the principal is a cross-realm TGT
215 * principal-- a principal with first component krbtgt and second
/osnet-11/usr/src/lib/krb5/kadm5/
H A Dadmin.h89 * The kadmin/admin principal is unused on Solaris. This principal is used
238 krb5_principal principal; member in struct:_kadm5_principal_ent_t
467 krb5_principal principal,
480 krb5_principal principal);
487 krb5_principal principal,
491 krb5_principal principal,
494 krb5_principal principal,
505 krb5_principal principal,
510 krb5_principal principal,
[all...]
H A Dserver_internal.h87 krb5_principal principal);
88 kadm5_ret_t principal_exists(krb5_principal principal);
98 krb5_principal principal, krb5_db_entry *kdb,
/osnet-11/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss_utils.c141 * specific principal name (for the user name) in exported form.
144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument
154 *principal = NULL;
223 (*principal) = malloc(plen);
224 if ((*principal) == NULL) {
228 bzero((caddr_t)(*principal), plen);
229 (*principal)->len = RNDUP(name_buf.length);
230 s = (*principal)->name;
/osnet-11/usr/src/lib/krb5/kadm5/srv/
H A Dserver_misc.c138 krb5_principal principal)
179 int i, n = krb5_princ_size(handle->context, principal);
180 cp = krb5_princ_realm(handle->context, principal)->data;
184 cp = krb5_princ_component(handle->context, principal, i)->data;
136 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
H A Dserver_acl.c214 * entry ::= [<whitespace>] <principal> <whitespace> <opstring>
643 kadm5int_acl_find_entry(kcontext, principal, dest_princ)
645 krb5_principal principal;
678 &principal->realm, 0, (wildstate_t *)0) &&
679 (entry->ae_principal->length == principal->length)) {
681 for (i=0; i<principal->length; i++) {
683 &principal->data[i], 0, &state)) {
693 /* We've matched the principal. If we have a target, then try it */
787 * kadm5int_acl_check_krb() - Is this operation permitted for this principal?
790 kadm5int_acl_check_krb(kcontext, caller_princ, opmask, principal, restriction
[all...]
H A Dsvr_principal.c279 * Check to see if the principal exists
281 ret = kdb_get_entry(handle, entry->principal, &kdb, &adb);
327 &polent, entry->principal);
392 principal. */
395 entry->principal, &(kdb.princ)))) {
523 /* In all cases key and the principal data is set, let the database provider know */
557 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument
569 if (principal == NULL)
572 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
594 ret = kdb_delete_entry(handle, principal);
858 kadm5_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, long in_mask) argument
1399 kadm5_chpass_principal(void *server_handle, krb5_principal principal, char *password) argument
1408 kadm5_chpass_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument
1614 kadm5_randkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock **keyblocks, int *n_keys) argument
1639 kadm5_randkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keyblocks, int *n_keys) argument
1920 kadm5_setkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock *keyblocks, int n_keys) argument
1932 kadm5_setkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock *keyblocks, int n_keys) argument
2297 kadm5_check_min_life(void *server_handle, krb5_principal principal, char *msg_ret, unsigned int msg_len) argument
[all...]
/osnet-11/usr/src/lib/libnsl/rpc/
H A Drpcsec_gss_if.c154 char *principal, /* server service principal */
163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism,
177 rpc_gss_principal_t *principal,
185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism,
223 char *principal, /* server service principal name */
231 return ((*calls.rpc_gss_set_svc_name)(principal, mechanism, req_time,
152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument
176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument
222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_util.c313 char *principal; local
316 if (asprintf(&principal, "%s@%s", ctx->ct_user, ctx->ct_realm) == -1)
319 DPRINT("user=%s, principal=%s, request=0x%08x",
320 ctx->ct_user, principal, ctx->ct_rflags);
321 rc = (force) ? smb_kinit_force(principal, ctx->ct_password) :
322 smb_kinit(principal, ctx->ct_password);
324 free(principal);
327 free(principal);

Completed in 67 milliseconds

123