/sssd/src/tests/cmocka/ |
H A D | test_copy_keytab.c | 7 SSSD tests: Tests keytab utilities 32 #define KEYTAB_TEST_PRINC "test/keytab@TEST.KEYTAB" 33 #define KEYTAB_PATH TESTS_PATH "/keytab_test.keytab" 34 #define EMPTY_KEYTAB_PATH TESTS_PATH "/empty_keytab_test.keytab" 108 krb5_keytab keytab; local 120 kerr = krb5_kt_resolve(test_ctx->kctx, mem_keytab_name, &keytab); 123 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 9, 9, 127 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 1, 132 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 2, 137 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ct 159 krb5_keytab keytab; local 208 krb5_keytab keytab; local [all...] |
H A D | common_mock_krb5.c | 8 SSSD tests: Tests keytab utilities 34 krb5_keytab keytab; local 37 kerr = krb5_kt_resolve(kctx, kt_path, &keytab); 41 kerr = krb5_kt_add_entry(kctx, keytab, &kt_keys[n]); 45 kerr = krb5_kt_close(kctx, keytab);
|
H A D | test_ipa_subdomains_server.c | 50 #define KEYTAB_PATH TEST_DIR"/"TESTS_PATH"/keytab_test.keytab" 66 #define ONEWAY_KEYTAB TEST_DIR"/"TESTS_PATH"/"SUBDOM_REALM".keytab" 393 const char *keytab, 422 /* the system keytab is always used with two-way trusts */ 425 if (keytab != NULL) { 427 assert_string_equal(s, keytab); 777 /* Test scenario where a keytab already exists, but refresh fails. In this case, 778 * sssd should attempt to reuse the previous keytab 811 /* Tests case where there's no keytab and retrieving fails. Just fail the 389 assert_trust_object(struct ipa_ad_server_ctx *trust, const char *dom_name, const char *dom_realm, const char *sid, const char *keytab, const char *authid, const char *sdap_realm) argument
|
/sssd/src/providers/krb5/ |
H A D | krb5_keytab.c | 4 Kerberos 5 Backend Module -- keytab related utilities 40 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n"); 61 DEBUG(SSSDBG_MINOR_FAILURE, "Failed to free keytab entry.\n"); 81 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n"); 94 krb5_keytab keytab = NULL; local 116 kerr = krb5_kt_resolve(kctx, keytab_file, &keytab); 118 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s].\n", 123 kerr = sss_krb5_kt_have_content(kctx, keytab); 125 DEBUG(SSSDBG_CRIT_FAILURE, "keytab [%s] has not entries.\n", 130 kerr = krb5_kt_get_name(kctx, keytab, keytab_nam [all...] |
H A D | krb5_child.c | 76 char *keytab; member in struct:krb5_req 1082 krb5_keytab keytab; local 1091 memset(&keytab, 0, sizeof(keytab)); 1092 kerr = krb5_kt_resolve(kr->ctx, kr->keytab, &keytab); 1094 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s], " \ 1095 "not verifying TGT.\n", kr->keytab); 1100 kerr = krb5_kt_start_seq_get(kr->ctx, keytab, &cursor); 1102 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab [ 1225 get_and_save_tgt_with_keytab(krb5_context ctx, struct cli_opts *cli_opts, krb5_principal princ, krb5_keytab keytab, char *ccname) argument 2073 krb5_keytab keytab = NULL; local [all...] |
H A D | krb5_child_handler.c | 102 const char *keytab; local 109 keytab = dp_opt_get_cstring(kr->krb5_ctx->opts, KRB5_KEYTAB); 110 if (keytab == NULL) { 111 DEBUG(SSSDBG_CRIT_FAILURE, "Missing keytab option.\n"); 149 buf->size += 4*sizeof(uint32_t) + strlen(kr->ccname) + strlen(keytab) + 202 SAFEALIGN_SET_UINT32(&buf->data[rp], strlen(keytab), &rp); 203 safealign_memcpy(&buf->data[rp], keytab, strlen(keytab), &rp);
|
/sssd/src/providers/ipa/ |
H A D | ipa_subdomains_server.c | 40 "%s/%s.keytab", IPA_TRUST_KEYTAB_DIR, forest); 66 /* Shouldn't happen, but let's try system keytab in this case */ 136 char *keytab; local 142 keytab = forest_keytab(id_ctx, forest); 144 if (keytab == NULL || principal == NULL) { 151 keytab, 154 talloc_free(keytab); 363 const char *keytab) 379 if (server == NULL || principal == NULL || keytab == NULL) { 385 "Retrieving keytab fo 358 ipa_getkeytab_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *ccache, const char *server, const char *principal, const char *keytab) argument 542 ipa_check_keytab(const char *keytab, uid_t kt_owner_uid, gid_t kt_owner_gid) argument 582 const char *keytab; member in struct:ipa_server_trusted_dom_setup_state [all...] |
/sssd/src/providers/ldap/ |
H A D | ldap_child.c | 198 krb5_keytab keytab) 206 krberr = krb5_kt_start_seq_get(context, keytab, &cursor); 209 "Cannot read keytab [%s].\n", KEYTAB_CLEAN_NAME); 211 sss_log(SSS_LOG_ERR, "Error reading keytab file [%s]: [%d][%s]. " 221 while ((krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) { 225 "Could not parse keytab entry\n"); 226 sss_log(SSS_LOG_ERR, "Could not parse keytab entry\n"); 239 DEBUG(SSSDBG_CRIT_FAILURE,"Could not free keytab entry contents\n"); 248 krberr = krb5_kt_end_seq_get(context, keytab, &cursor); 250 DEBUG(SSSDBG_FATAL_FAILURE, "Could not close keytab 195 lc_verify_keytab_ex(const char *principal, const char *keytab_name, krb5_context context, krb5_keytab keytab) argument 287 krb5_keytab keytab = NULL; local [all...] |
H A D | sdap_async_connection.c | 1051 /* ==Perform-Kinit-given-keytab-and-principal============================= */ 1054 const char *keytab; member in struct:sdap_kinit_state 1079 const char *keytab, 1091 keytab ? keytab : "default", 1102 state->keytab = keytab; 1175 state->principal, state->keytab, 1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
|
/sssd/src/util/ |
H A D | sss_krb5.h | 74 krb5_keytab keytab, 177 krb5_keytab keytab, 186 krb5_keytab keytab);
|
H A D | sss_krb5.c | 71 krb5_keytab keytab = NULL; local 93 * - pick the first principal in the keytab 101 "trying to select the most appropriate principal from keytab\n"); 116 kerr = krb5_kt_resolve(krb_ctx, keytab_name, &keytab); 118 kerr = krb5_kt_default(krb_ctx, &keytab); 122 "Failed to read keytab [%s]: %s\n", 158 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm, 238 DEBUG(SSSDBG_MINOR_FAILURE, "No suitable principal found in keytab\n"); 244 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to read keytab [%s]: %s\n", 246 sss_log(SSS_LOG_ERR, "Failed to read keytab [ 344 find_principal_in_keytab(krb5_context ctx, krb5_keytab keytab, const char *pattern_primary, const char *pattern_realm, krb5_principal *princ) argument 865 sss_extract_pac(krb5_context ctx, krb5_ccache ccache, krb5_principal server_principal, krb5_principal client_principal, krb5_keytab keytab, krb5_authdata ***_pac_authdata) argument 1034 sss_krb5_kt_have_content(krb5_context context, krb5_keytab keytab) argument [all...] |
/sssd/src/providers/ad/ |
H A D | ad_common.h | 115 const char *keytab); 120 const char *keytab,
|
H A D | ad_common.c | 143 const char *keytab) 165 if (keytab != NULL) { 166 ret = dp_opt_set_string(ad_options->basic, AD_KEYTAB, keytab); 168 DEBUG(SSSDBG_OP_FAILURE, "Cannot set keytab\n"); 181 const char *keytab) 190 keytab); 209 const char *keytab, 226 ad_domain, hostname, keytab); 139 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument 177 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument 206 ad_create_1way_trust_options(TALLOC_CTX *mem_ctx, const char *ad_domain, const char *hostname, const char *keytab, const char *sasl_authid) argument
|
H A D | ad_subdomains.c | 160 const char *keytab; local 164 keytab = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KEYTAB); 172 hostname, keytab);
|