Searched refs:principal (Results 1 - 13 of 13) sorted by relevance

/sssd-io/src/tests/cmocka/
H A Dcommon_mock_krb5.c52 krb5_principal principal,
61 kent->principal = principal;
75 krb5_principal principal; local
87 kerr = krb5_parse_name(kctx, keytab_princ, &principal);
92 mock_krb5_keytab_entry(&keys[0], principal, 12345, 1, 1, "11");
93 mock_krb5_keytab_entry(&keys[1], principal, 12345, 1, 2, "12");
98 krb5_free_principal(kctx, principal);
51 mock_krb5_keytab_entry(krb5_keytab_entry *kent, krb5_principal principal, krb5_timestamp timestamp, krb5_kvno vno, krb5_enctype enctype, const char *key) argument
H A Dcommon_mock_krb5.h31 krb5_principal principal,
42 /* Dummy keys with user-selected principal */
H A Dtest_copy_keytab.c39 krb5_principal principal; member in struct:keytab_test_ctx
62 &test_ctx->principal);
67 mock_krb5_keytab_entry(&keys[0], test_ctx->principal, 12345, 1, 1, "11");
68 mock_krb5_keytab_entry(&keys[1], test_ctx->principal, 12345, 1, 2, "12");
69 mock_krb5_keytab_entry(&keys[2], test_ctx->principal, 12345, 2, 1, "21");
70 mock_krb5_keytab_entry(&keys[3], test_ctx->principal, 12345, 2, 2, "22");
87 krb5_free_principal(test_ctx->kctx, test_ctx->principal);
123 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 9, 9,
127 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 1,
132 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal,
[all...]
/sssd-io/src/tests/intg/
H A Dkrb5utils.py28 def __init__(self, principal):
29 Exception.__init__(self, 'Principal %s not found' % principal)
60 def kinit(self, principal, password, env=None):
61 args = ["kinit", principal]
64 def kvno(self, principal, env=None):
65 args = ["kvno", principal]
75 def kswitch(self, principal, env=None):
76 args = ["kswitch", '-p', principal]
140 if line.startswith("Default principal"):
/sssd-io/src/providers/krb5/
H A Dkrb5_ccache.h47 const char *realm, const char *principal);
H A Dkrb5_ccache.c474 const char *realm, const char *principal)
522 kerr = krb5_parse_name(cc->context, principal, &princ);
751 "error reading principal from ccache [%s].\n", ccache_name);
473 sss_krb5_cc_verify_ccache(const char *ccname, uid_t uid, gid_t gid, const char *realm, const char *principal) argument
H A Dkrb5_child.c1306 char *principal = NULL; local
1339 kerr = krb5_copy_principal(kr->ctx, entry.principal,
1384 /* Get the principal to which the key belongs, for logging purposes. */
1385 principal = NULL;
1386 kerr = krb5_unparse_name(kr->ctx, validation_princ, &principal);
1388 DEBUG(SSSDBG_CRIT_FAILURE, "internal error parsing principal name, "
1401 principal);
1404 "for [%s].\n", principal);
1415 "membership for user with principal [%s] " \
1425 "membership for user with principal [
[all...]
/sssd-io/src/util/
H A Dsss_krb5.c101 * - pick the first principal in the keytab
109 "trying to select the most appropriate principal from keytab\n");
196 DEBUG(SSSDBG_FUNC_DATA, "Selected principal: %s\n", *_principal);
246 DEBUG(SSSDBG_MINOR_FAILURE, "No suitable principal found in keytab\n");
273 * @param principal principal we want to match
274 * @param pattern_primary primary part of the principal we want to
278 * @param pattern_realm realm part of the principal we want to perform
282 krb5_principal principal,
298 sss_krb5_princ_realm(ctx, principal,
281 match_principal(krb5_context ctx, krb5_principal principal, const char *pattern_primary, const char *pattern_realm) argument
659 sss_krb5_parse_name_flags(krb5_context context, const char *name, int flags, krb5_principal *principal) argument
678 sss_krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument
984 sss_get_ccache_name_for_principal(TALLOC_CTX *mem_ctx, krb5_context ctx, krb5_principal principal, const char *location) argument
[all...]
H A Dsss_krb5.h126 krb5_principal *principal);
134 sss_krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal,
183 krb5_principal principal,
/sssd-io/src/providers/ipa/
H A Dipa_subdomains_server.c139 char *principal; local
143 principal = subdomain_trust_princ(id_ctx, forest_realm, subdom);
144 if (keytab == NULL || principal == NULL) {
155 principal);
158 talloc_free(principal);
381 const char *principal,
394 const char *principal,
411 if (server == NULL || principal == NULL || keytab == NULL) {
418 principal, server, keytab, ccache);
422 ipa_getkeytab_exec(ccache, server, principal, keyta
390 ipa_getkeytab_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *ccache, const char *server, const char *principal, const char *keytab) argument
462 ipa_getkeytab_exec(const char *ccache, const char *server, const char *principal, const char *keytab_path) argument
616 const char *principal; member in struct:ipa_server_trusted_dom_setup_state
[all...]
/sssd-io/src/tests/python/sssd/testlib/common/
H A Dlibkrb5.py115 self.multihost.log.info("host principal added")
150 def add_principal(self, principal=None,
156 :param str principal: principal name (foobar)
157 :param str p_type: principal type (user/admin/None)
159 :param str service: service principal (host/http/nfs)
161 :return bool: True if principal is added
164 # Todo: Need to check if a principal already exists before adding.
170 " -pw %s %s@%s" % (password, principal,
/sssd-io/src/providers/ldap/
H A Dldap_child.c189 static int lc_verify_keytab_ex(const char *principal, argument
216 krberr = krb5_unparse_name(context, entry.principal, &kt_principal);
224 if (strcmp(principal, kt_principal) == 0) {
253 principal,
258 KEYTAB_CLEAN_NAME, principal);
365 DEBUG(SSSDBG_OP_FAILURE, "Unable to build principal: %s\n",
388 "Unable to verify principal is present in the keytab\n");
465 /* Use updated principal if changed due to canonicalization. */
H A Dsdap_async_connection.c1051 /* ==Perform-Kinit-given-keytab-and-principal============================= */
1055 const char *principal; member in struct:sdap_kinit_state
1080 const char *principal,
1092 principal, realm, lifetime);
1103 state->principal = principal;
1175 state->principal, state->keytab,
1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument

Completed in 36 milliseconds