/sssd-io/src/tests/cmocka/ |
H A D | common_mock_krb5.c | 52 krb5_principal principal, 61 kent->principal = principal; 75 krb5_principal principal; local 87 kerr = krb5_parse_name(kctx, keytab_princ, &principal); 92 mock_krb5_keytab_entry(&keys[0], principal, 12345, 1, 1, "11"); 93 mock_krb5_keytab_entry(&keys[1], principal, 12345, 1, 2, "12"); 98 krb5_free_principal(kctx, principal); 51 mock_krb5_keytab_entry(krb5_keytab_entry *kent, krb5_principal principal, krb5_timestamp timestamp, krb5_kvno vno, krb5_enctype enctype, const char *key) argument
|
H A D | common_mock_krb5.h | 31 krb5_principal principal, 42 /* Dummy keys with user-selected principal */
|
H A D | test_copy_keytab.c | 39 krb5_principal principal; member in struct:keytab_test_ctx 62 &test_ctx->principal); 67 mock_krb5_keytab_entry(&keys[0], test_ctx->principal, 12345, 1, 1, "11"); 68 mock_krb5_keytab_entry(&keys[1], test_ctx->principal, 12345, 1, 2, "12"); 69 mock_krb5_keytab_entry(&keys[2], test_ctx->principal, 12345, 2, 1, "21"); 70 mock_krb5_keytab_entry(&keys[3], test_ctx->principal, 12345, 2, 2, "22"); 87 krb5_free_principal(test_ctx->kctx, test_ctx->principal); 123 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 9, 9, 127 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 1, 132 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, [all...] |
/sssd-io/src/tests/intg/ |
H A D | krb5utils.py | 28 def __init__(self, principal): 29 Exception.__init__(self, 'Principal %s not found' % principal) 60 def kinit(self, principal, password, env=None): 61 args = ["kinit", principal] 64 def kvno(self, principal, env=None): 65 args = ["kvno", principal] 75 def kswitch(self, principal, env=None): 76 args = ["kswitch", '-p', principal] 140 if line.startswith("Default principal"):
|
/sssd-io/src/providers/krb5/ |
H A D | krb5_ccache.h | 47 const char *realm, const char *principal);
|
H A D | krb5_ccache.c | 474 const char *realm, const char *principal) 522 kerr = krb5_parse_name(cc->context, principal, &princ); 751 "error reading principal from ccache [%s].\n", ccache_name); 473 sss_krb5_cc_verify_ccache(const char *ccname, uid_t uid, gid_t gid, const char *realm, const char *principal) argument
|
H A D | krb5_child.c | 1306 char *principal = NULL; local 1339 kerr = krb5_copy_principal(kr->ctx, entry.principal, 1384 /* Get the principal to which the key belongs, for logging purposes. */ 1385 principal = NULL; 1386 kerr = krb5_unparse_name(kr->ctx, validation_princ, &principal); 1388 DEBUG(SSSDBG_CRIT_FAILURE, "internal error parsing principal name, " 1401 principal); 1404 "for [%s].\n", principal); 1415 "membership for user with principal [%s] " \ 1425 "membership for user with principal [ [all...] |
/sssd-io/src/util/ |
H A D | sss_krb5.c | 101 * - pick the first principal in the keytab 109 "trying to select the most appropriate principal from keytab\n"); 196 DEBUG(SSSDBG_FUNC_DATA, "Selected principal: %s\n", *_principal); 246 DEBUG(SSSDBG_MINOR_FAILURE, "No suitable principal found in keytab\n"); 273 * @param principal principal we want to match 274 * @param pattern_primary primary part of the principal we want to 278 * @param pattern_realm realm part of the principal we want to perform 282 krb5_principal principal, 298 sss_krb5_princ_realm(ctx, principal, 281 match_principal(krb5_context ctx, krb5_principal principal, const char *pattern_primary, const char *pattern_realm) argument 659 sss_krb5_parse_name_flags(krb5_context context, const char *name, int flags, krb5_principal *principal) argument 678 sss_krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument 984 sss_get_ccache_name_for_principal(TALLOC_CTX *mem_ctx, krb5_context ctx, krb5_principal principal, const char *location) argument [all...] |
H A D | sss_krb5.h | 126 krb5_principal *principal); 134 sss_krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, 183 krb5_principal principal,
|
/sssd-io/src/providers/ipa/ |
H A D | ipa_subdomains_server.c | 139 char *principal; local 143 principal = subdomain_trust_princ(id_ctx, forest_realm, subdom); 144 if (keytab == NULL || principal == NULL) { 155 principal); 158 talloc_free(principal); 381 const char *principal, 394 const char *principal, 411 if (server == NULL || principal == NULL || keytab == NULL) { 418 principal, server, keytab, ccache); 422 ipa_getkeytab_exec(ccache, server, principal, keyta 390 ipa_getkeytab_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *ccache, const char *server, const char *principal, const char *keytab) argument 462 ipa_getkeytab_exec(const char *ccache, const char *server, const char *principal, const char *keytab_path) argument 616 const char *principal; member in struct:ipa_server_trusted_dom_setup_state [all...] |
/sssd-io/src/tests/python/sssd/testlib/common/ |
H A D | libkrb5.py | 115 self.multihost.log.info("host principal added") 150 def add_principal(self, principal=None, 156 :param str principal: principal name (foobar) 157 :param str p_type: principal type (user/admin/None) 159 :param str service: service principal (host/http/nfs) 161 :return bool: True if principal is added 164 # Todo: Need to check if a principal already exists before adding. 170 " -pw %s %s@%s" % (password, principal,
|
/sssd-io/src/providers/ldap/ |
H A D | ldap_child.c | 189 static int lc_verify_keytab_ex(const char *principal, argument 216 krberr = krb5_unparse_name(context, entry.principal, &kt_principal); 224 if (strcmp(principal, kt_principal) == 0) { 253 principal, 258 KEYTAB_CLEAN_NAME, principal); 365 DEBUG(SSSDBG_OP_FAILURE, "Unable to build principal: %s\n", 388 "Unable to verify principal is present in the keytab\n"); 465 /* Use updated principal if changed due to canonicalization. */
|
H A D | sdap_async_connection.c | 1051 /* ==Perform-Kinit-given-keytab-and-principal============================= */ 1055 const char *principal; member in struct:sdap_kinit_state 1080 const char *principal, 1092 principal, realm, lifetime); 1103 state->principal = principal; 1175 state->principal, state->keytab, 1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
|