Searched defs:keytab (Results 1 - 12 of 12) sorted by relevance

/sssd-io/src/providers/krb5/
H A Dkrb5_keytab.c4 Kerberos 5 Backend Module -- keytab related utilities
40 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n");
61 DEBUG(SSSDBG_MINOR_FAILURE, "Failed to free keytab entry.\n");
81 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab.\n");
94 krb5_keytab keytab = NULL; local
116 kerr = krb5_kt_resolve(kctx, keytab_file, &keytab);
118 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s].\n",
123 kerr = sss_krb5_kt_have_content(kctx, keytab);
125 DEBUG(SSSDBG_CRIT_FAILURE, "keytab [%s] has not entries.\n",
130 kerr = krb5_kt_get_name(kctx, keytab, keytab_nam
[all...]
H A Dkrb5_child_handler.c108 const char *keytab; local
116 keytab = dp_opt_get_cstring(kr->krb5_ctx->opts, KRB5_KEYTAB);
117 if (keytab == NULL) {
118 DEBUG(SSSDBG_CRIT_FAILURE, "Missing keytab option.\n");
169 buf->size += 4*sizeof(uint32_t) + strlen(kr->ccname) + strlen(keytab) +
224 SAFEALIGN_SET_UINT32(&buf->data[rp], strlen(keytab), &rp);
225 safealign_memcpy(&buf->data[rp], keytab, strlen(keytab), &rp);
H A Dkrb5_child.c93 char *keytab; member in struct:krb5_req
1307 krb5_keytab keytab; local
1316 memset(&keytab, 0, sizeof(keytab));
1317 kerr = krb5_kt_resolve(kr->ctx, kr->keytab, &keytab);
1319 DEBUG(SSSDBG_CRIT_FAILURE, "error resolving keytab [%s], " \
1320 "not verifying TGT.\n", kr->keytab);
1325 kerr = krb5_kt_start_seq_get(kr->ctx, keytab, &cursor);
1327 DEBUG(SSSDBG_CRIT_FAILURE, "error reading keytab [
1450 get_and_save_tgt_with_keytab(krb5_context ctx, struct cli_opts *cli_opts, krb5_principal princ, krb5_keytab keytab, char *ccname) argument
2576 krb5_keytab keytab = NULL; local
[all...]
/sssd-io/src/tests/cmocka/
H A Dcommon_mock_krb5.c8 SSSD tests: Tests keytab utilities
34 krb5_keytab keytab; local
37 kerr = krb5_kt_resolve(kctx, kt_path, &keytab);
41 kerr = krb5_kt_add_entry(kctx, keytab, &kt_keys[n]);
45 kerr = krb5_kt_close(kctx, keytab);
H A Dtest_copy_keytab.c7 SSSD tests: Tests keytab utilities
32 #define KEYTAB_TEST_PRINC "test/keytab@TEST.KEYTAB"
33 #define KEYTAB_PATH TESTS_PATH "/keytab_test.keytab"
34 #define EMPTY_KEYTAB_PATH TESTS_PATH "/empty_keytab_test.keytab"
108 krb5_keytab keytab; local
120 kerr = krb5_kt_resolve(test_ctx->kctx, mem_keytab_name, &keytab);
123 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 9, 9,
127 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 1,
132 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 1, 2,
137 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ct
159 krb5_keytab keytab; local
208 krb5_keytab keytab; local
[all...]
H A Dtest_ipa_subdomains_server.c51 #define KEYTAB_PATH TEST_DIR"/"TESTS_PATH"/keytab_test.keytab"
67 #define ONEWAY_KEYTAB TEST_DIR"/"TESTS_PATH"/"SUBDOM_REALM".keytab"
394 const char *keytab,
423 /* the system keytab is always used with two-way trusts */
426 if (keytab != NULL) {
428 assert_string_equal(s, keytab);
806 /* Test scenario where a keytab already exists, but refresh fails. In this case,
807 * sssd should attempt to reuse the previous keytab
840 /* Tests case where there's no keytab and retrieving fails. Just fail the
390 assert_trust_object(struct ipa_ad_server_ctx *trust, const char *dom_name, const char *dom_realm, const char *sid, const char *keytab, const char *authid, const char *sdap_realm) argument
/sssd-io/src/providers/ldap/
H A Dldap_child.c192 krb5_keytab keytab)
200 krberr = krb5_kt_start_seq_get(context, keytab, &cursor);
203 "Cannot read keytab [%s].\n", KEYTAB_CLEAN_NAME);
205 sss_log(SSS_LOG_ERR, "Error reading keytab file [%s]: [%d][%s]. "
215 while ((krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) {
219 "Could not parse keytab entry\n");
220 sss_log(SSS_LOG_ERR, "Could not parse keytab entry\n");
233 DEBUG(SSSDBG_CRIT_FAILURE,"Could not free keytab entry contents\n");
242 krberr = krb5_kt_end_seq_get(context, keytab, &cursor);
244 DEBUG(SSSDBG_FATAL_FAILURE, "Could not close keytab
189 lc_verify_keytab_ex(const char *principal, const char *keytab_name, krb5_context context, krb5_keytab keytab) argument
282 krb5_keytab keytab = NULL; local
[all...]
H A Dsdap_async_connection.c1051 /* ==Perform-Kinit-given-keytab-and-principal============================= */
1054 const char *keytab; member in struct:sdap_kinit_state
1079 const char *keytab,
1091 keytab ? keytab : "default",
1102 state->keytab = keytab;
1175 state->principal, state->keytab,
1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
/sssd-io/src/providers/ad/
H A Dad_common.c275 const char *keytab)
297 if (keytab != NULL) {
298 ret = dp_opt_set_string(ad_options->basic, AD_KEYTAB, keytab);
300 DEBUG(SSSDBG_OP_FAILURE, "Cannot set keytab\n");
316 const char *keytab)
331 keytab);
355 const char *keytab,
379 subdom->name, hostname, keytab);
271 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument
309 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb, const char *conf_path, struct data_provider *dp, const char *realm, struct sss_domain_info *subdom, const char *hostname, const char *keytab) argument
349 ad_create_1way_trust_options(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb, const char *subdom_conf_path, struct data_provider *dp, struct sss_domain_info *subdom, const char *hostname, const char *keytab, const char *sasl_authid) argument
H A Dad_subdomains.c250 const char *keytab; local
255 keytab = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KEYTAB);
274 hostname, keytab);
/sssd-io/src/providers/ipa/
H A Dipa_subdomains_server.c40 "%s/%s.keytab", IPA_TRUST_KEYTAB_DIR, forest);
66 /* Shouldn't happen, but let's try system keytab in this case */
138 char *keytab; local
142 keytab = forest_keytab(id_ctx, forest);
144 if (keytab == NULL || principal == NULL) {
154 keytab,
157 talloc_free(keytab);
395 const char *keytab)
411 if (server == NULL || principal == NULL || keytab == NULL) {
417 "Retrieving keytab fo
390 ipa_getkeytab_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *ccache, const char *server, const char *principal, const char *keytab) argument
574 ipa_check_keytab(const char *keytab, uid_t kt_owner_uid, gid_t kt_owner_gid) argument
614 const char *keytab; member in struct:ipa_server_trusted_dom_setup_state
[all...]
/sssd-io/src/util/
H A Dsss_krb5.c79 krb5_keytab keytab = NULL; local
101 * - pick the first principal in the keytab
109 "trying to select the most appropriate principal from keytab\n");
124 kerr = krb5_kt_resolve(krb_ctx, keytab_name, &keytab);
126 kerr = krb5_kt_default(krb_ctx, &keytab);
130 "Failed to read keytab [%s]: %s\n",
166 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm,
246 DEBUG(SSSDBG_MINOR_FAILURE, "No suitable principal found in keytab\n");
252 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to read keytab [%s]: %s\n",
254 sss_log(SSS_LOG_ERR, "Failed to read keytab [
352 find_principal_in_keytab(krb5_context ctx, krb5_keytab keytab, const char *pattern_primary, const char *pattern_realm, krb5_principal *princ) argument
873 sss_extract_pac(krb5_context ctx, krb5_ccache ccache, krb5_principal server_principal, krb5_principal client_principal, krb5_keytab keytab, krb5_authdata ***_pac_authdata) argument
1042 sss_krb5_kt_have_content(krb5_context context, krb5_keytab keytab) argument
[all...]

Completed in 46 milliseconds