Searched refs:keytab (Results 1 - 14 of 14) sorted by relevance

/sssd/src/tests/cmocka/
H A Dtest_copy_keytab.c7 SSSD tests: Tests keytab utilities
32 #define KEYTAB_TEST_PRINC "test/keytab@TEST.KEYTAB"
33 #define KEYTAB_PATH TESTS_PATH "/keytab_test.keytab"
34 #define EMPTY_KEYTAB_PATH TESTS_PATH "/empty_keytab_test.keytab"
108 krb5_keytab keytab; local
120 kerr = krb5_kt_resolve(test_ctx->kctx, mem_keytab_name, &keytab);
123 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 9, 9,
127 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 1,
132 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 2,
137 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ct
159 krb5_keytab keytab; local
208 krb5_keytab keytab; local
[all...]
H A Dcommon_mock_krb5.c8 SSSD tests: Tests keytab utilities
34 krb5_keytab keytab; local
37 kerr = krb5_kt_resolve(kctx, kt_path, &keytab);
41 kerr = krb5_kt_add_entry(kctx, keytab, &kt_keys[n]);
45 kerr = krb5_kt_close(kctx, keytab);
H A Dtest_ipa_subdomains_server.c50 #define KEYTAB_PATH TEST_DIR"/"TESTS_PATH"/keytab_test.keytab"
66 #define ONEWAY_KEYTAB TEST_DIR"/"TESTS_PATH"/"SUBDOM_REALM".keytab"
393 const char *keytab,
422 /* the system keytab is always used with two-way trusts */
425 if (keytab != NULL) {
427 assert_string_equal(s, keytab);
777 /* Test scenario where a keytab already exists, but refresh fails. In this case,
778 * sssd should attempt to reuse the previous keytab
811 /* Tests case where there's no keytab and retrieving fails. Just fail the
389 assert_trust_object(struct ipa_ad_server_ctx *trust, const char *dom_name, const char *dom_realm, const char *sid, const char *keytab, const char *authid, const char *sdap_realm) argument
/sssd/src/providers/krb5/
H A Dkrb5_keytab.c4 Kerberos 5 Backend Module -- keytab related utilities
40 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n");
61 DEBUG(SSSDBG_MINOR_FAILURE, "Failed to free keytab entry.\n");
81 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n");
94 krb5_keytab keytab = NULL; local
116 kerr = krb5_kt_resolve(kctx, keytab_file, &keytab);
118 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s].\n",
123 kerr = sss_krb5_kt_have_content(kctx, keytab);
125 DEBUG(SSSDBG_CRIT_FAILURE, "keytab [%s] has not entries.\n",
130 kerr = krb5_kt_get_name(kctx, keytab, keytab_nam
[all...]
H A Dkrb5_child.c76 char *keytab; member in struct:krb5_req
1082 krb5_keytab keytab; local
1091 memset(&keytab, 0, sizeof(keytab));
1092 kerr = krb5_kt_resolve(kr->ctx, kr->keytab, &keytab);
1094 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s], " \
1095 "not verifying TGT.\n", kr->keytab);
1100 kerr = krb5_kt_start_seq_get(kr->ctx, keytab, &cursor);
1102 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab [
1225 get_and_save_tgt_with_keytab(krb5_context ctx, struct cli_opts *cli_opts, krb5_principal princ, krb5_keytab keytab, char *ccname) argument
2073 krb5_keytab keytab = NULL; local
[all...]
H A Dkrb5_child_handler.c102 const char *keytab; local
109 keytab = dp_opt_get_cstring(kr->krb5_ctx->opts, KRB5_KEYTAB);
110 if (keytab == NULL) {
111 DEBUG(SSSDBG_CRIT_FAILURE, "Missing keytab option.\n");
149 buf->size += 4*sizeof(uint32_t) + strlen(kr->ccname) + strlen(keytab) +
202 SAFEALIGN_SET_UINT32(&buf->data[rp], strlen(keytab), &rp);
203 safealign_memcpy(&buf->data[rp], keytab, strlen(keytab), &rp);
/sssd/src/providers/ipa/
H A Dipa_subdomains_server.c40 "%s/%s.keytab", IPA_TRUST_KEYTAB_DIR, forest);
66 /* Shouldn't happen, but let's try system keytab in this case */
136 char *keytab; local
142 keytab = forest_keytab(id_ctx, forest);
144 if (keytab == NULL || principal == NULL) {
151 keytab,
154 talloc_free(keytab);
363 const char *keytab)
379 if (server == NULL || principal == NULL || keytab == NULL) {
385 "Retrieving keytab fo
358 ipa_getkeytab_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *ccache, const char *server, const char *principal, const char *keytab) argument
542 ipa_check_keytab(const char *keytab, uid_t kt_owner_uid, gid_t kt_owner_gid) argument
582 const char *keytab; member in struct:ipa_server_trusted_dom_setup_state
[all...]
/sssd/src/providers/ldap/
H A Dldap_child.c198 krb5_keytab keytab)
206 krberr = krb5_kt_start_seq_get(context, keytab, &cursor);
209 "Cannot read keytab [%s].\n", KEYTAB_CLEAN_NAME);
211 sss_log(SSS_LOG_ERR, "Error reading keytab file [%s]: [%d][%s]. "
221 while ((krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) {
225 "Could not parse keytab entry\n");
226 sss_log(SSS_LOG_ERR, "Could not parse keytab entry\n");
239 DEBUG(SSSDBG_CRIT_FAILURE,"Could not free keytab entry contents\n");
248 krberr = krb5_kt_end_seq_get(context, keytab, &cursor);
250 DEBUG(SSSDBG_FATAL_FAILURE, "Could not close keytab
195 lc_verify_keytab_ex(const char *principal, const char *keytab_name, krb5_context context, krb5_keytab keytab) argument
287 krb5_keytab keytab = NULL; local
[all...]
H A Dsdap_async_connection.c1051 /* ==Perform-Kinit-given-keytab-and-principal============================= */
1054 const char *keytab; member in struct:sdap_kinit_state
1079 const char *keytab,
1091 keytab ? keytab : "default",
1102 state->keytab = keytab;
1175 state->principal, state->keytab,
1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
/sssd/src/util/
H A Dsss_krb5.h74 krb5_keytab keytab,
177 krb5_keytab keytab,
186 krb5_keytab keytab);
H A Dsss_krb5.c71 krb5_keytab keytab = NULL; local
93 * - pick the first principal in the keytab
101 "trying to select the most appropriate principal from keytab\n");
116 kerr = krb5_kt_resolve(krb_ctx, keytab_name, &keytab);
118 kerr = krb5_kt_default(krb_ctx, &keytab);
122 "Failed to read keytab [%s]: %s\n",
158 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm,
238 DEBUG(SSSDBG_MINOR_FAILURE, "No suitable principal found in keytab\n");
244 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to read keytab [%s]: %s\n",
246 sss_log(SSS_LOG_ERR, "Failed to read keytab [
344 find_principal_in_keytab(krb5_context ctx, krb5_keytab keytab, const char *pattern_primary, const char *pattern_realm, krb5_principal *princ) argument
865 sss_extract_pac(krb5_context ctx, krb5_ccache ccache, krb5_principal server_principal, krb5_principal client_principal, krb5_keytab keytab, krb5_authdata ***_pac_authdata) argument
1034 sss_krb5_kt_have_content(krb5_context context, krb5_keytab keytab) argument
[all...]
/sssd/src/providers/ad/
H A Dad_common.h115 const char *keytab);
120 const char *keytab,
H A Dad_common.c143 const char *keytab)
165 if (keytab != NULL) {
166 ret = dp_opt_set_string(ad_options->basic, AD_KEYTAB, keytab);
168 DEBUG(SSSDBG_OP_FAILURE, "Cannot set keytab\n");
181 const char *keytab)
190 keytab);
209 const char *keytab,
226 ad_domain, hostname, keytab);
139 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument
177 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument
206 ad_create_1way_trust_options(TALLOC_CTX *mem_ctx, const char *ad_domain, const char *hostname, const char *keytab, const char *sasl_authid) argument
H A Dad_subdomains.c160 const char *keytab; local
164 keytab = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KEYTAB);
172 hostname, keytab);

Completed in 1167 milliseconds