/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | set_realm.c | 35 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) argument 40 if (!realm || !*realm) 43 length = strlen(realm); 44 newrealm = strdup(realm);
|
H A D | bld_pr_ext.c | 37 unsigned int rlen, const char * realm, ...) 45 va_start(ap, realm); 67 tmpdata.data = (char *) realm; 68 if (krb5int_copy_data_contents_add0(context, &tmpdata, &princ_ret->realm) != 0) { 75 va_start(ap, realm); 92 free(princ_ret->realm.data); 36 krb5_build_principal_ext(krb5_context context, krb5_principal * princ, unsigned int rlen, const char * realm, ...) argument
|
H A D | srv_dec_tkt.c | 49 krb5_data *realm; local 57 realm = &ticket->enc_part2->client->realm; 60 realm, &ticket->server->realm);
|
H A D | libdef_parse.c | 66 krb5int_libdefault_string(krb5_context context, const krb5_data *realm, argument 75 if (realm->length > sizeof(realmstr)-1) 78 strncpy(realmstr, realm->data, realm->length); 79 realmstr[realm->length] = '\0'; 136 krb5int_libdefault_boolean(krb5_context context, const krb5_data *realm, argument 142 retval = krb5int_libdefault_string(context, realm, option, &string);
|
H A D | appdefault.c | 41 appdefault_get(krb5_context context, const char *appname, const krb5_data *realm, const char *option, char **ret_value) argument 47 const char * realmstr = realm?realm->data:NULL; 100 * realm = { 142 krb5_appdefault_boolean(krb5_context context, const char *appname, const krb5_data *realm, const char *option, int default_value, int *ret_value) argument 147 retval = appdefault_get(context, appname, realm, option, &string); 157 krb5_appdefault_string(krb5_context context, const char *appname, const krb5_data *realm, const char *option, const char *default_value, char **ret_value) argument 162 retval = appdefault_get(context, appname, realm, option, &string);
|
H A D | bld_princ.c | 40 const char *realm, 55 r = strdup(realm); 114 const char *realm, 119 return krb5int_build_principal_va(context, princ, rlen, realm, first, ap); 128 const char *realm, 138 retval = krb5int_build_principal_va(context, p, rlen, realm, first, ap); 154 const char *realm, 163 retval = krb5_build_principal_va(context, p, rlen, realm, ap); 179 const char * realm, ...) 184 va_start(ap, realm); 37 krb5int_build_principal_va(krb5_context context, krb5_principal princ, unsigned int rlen, const char *realm, const char *first, va_list ap) argument 111 krb5_build_principal_va(krb5_context context, krb5_principal princ, unsigned int rlen, const char *realm, va_list ap) argument 125 krb5int_build_principal_alloc_va(krb5_context context, krb5_principal *princ, unsigned int rlen, const char *realm, const char *first, va_list ap) argument 151 krb5_build_principal_alloc_va(krb5_context context, krb5_principal *princ, unsigned int rlen, const char *realm, va_list ap) argument 176 krb5_build_principal(krb5_context context, krb5_principal * princ, unsigned int rlen, const char * realm, ...) argument [all...] |
H A D | gic_keytab.c | 122 * have a referral realm. This happens when there is no applicable 123 * domain-to-realm mapping in the Kerberos configuration file. 124 * If that is the case then the realm of the first principal found 126 * realm. 128 if (krb5_is_referral_realm(&client->realm)) { 129 krb5_data realm; local 130 ret = krb5_kt_find_realm(context, keytab, client, &realm); 132 krb5_free_data_contents(context, &client->realm); 133 client->realm.length = realm [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | realm_dom.c | 33 * Determines the proper domain name for a realm. This is mainly so that 37 * If realm is NULL, this function will assume the default realm 50 krb5_get_realm_domain(krb5_context context, const char *realm, char **domain) argument 55 retval = profile_get_string(context->profile, KRB5_CONF_REALMS, realm, 56 KRB5_CONF_DEFAULT_DOMAIN, realm, &temp_domain);
|
H A D | def_realm.c | 74 * Retrieves the default realm to be used if no user-specified realm is 76 * realm omitted for convenience] 82 * Implementation: the default realm is stored in a configuration file, 84 * the default local realm name. 90 char *realm = 0; local 105 &realm); 107 if (!retval && realm) { 108 context->default_realm = strdup(realm); 110 profile_release_string(realm); [all...] |
H A D | get_krbhst.c | 36 Figures out the Kerberos server names for the given realm, filling in a 39 If the realm is unknown, the filled-in pointer is set to NULL. 51 * this file is taken as the default local realm name. 53 * Each succeeding line has a realm name as the first token, and a server name 57 * All lines which begin with the desired realm name will have the 62 krb5_get_krbhst(krb5_context context, const krb5_data *realm, char ***hostlist) argument 73 realm_kdc_names[1] = realm->data;
|
H A D | dnssrv.c | 59 krb5int_make_srv_query_realm(const krb5_data *realm, argument 77 * service.protocol.realm 85 if (memchr(realm->data, 0, realm->length)) 89 krb5int_buf_add_len(&buf, realm->data, realm->length); 94 realm names are absolutes, let's stop that.
|
H A D | sn2princ.c | 108 char **hrealms, *realm, *remote_host; local 145 triples as realm names. *sigh* 250 printf("sname_to_princ: realm <%s> after krb5_get_host_realm\n",hrealms[0]); 257 "Cannot determine realm for host: host is '%s'"), 263 realm = hrealms[0]; 265 retval = krb5_build_principal(context, ret_princ, strlen(realm), 266 realm, sname, remote_host, 274 printf("realm: <%s>, sname: <%s>, remote_host: <%s>\n", 275 realm,sname,remote_host);
|
H A D | dnsglue.c | 345 * Try to look up a TXT record pointing to a Kerberos realm 349 krb5_try_realm_txt_rr(const char *prefix, const char *name, char **realm) argument 371 realm names are absolutes, let's stop that. 396 *realm = malloc((size_t)len + 1); 397 if (*realm == NULL) { 401 strncpy(*realm, (const char *)p, (size_t)len); 402 (*realm)[len] = '\0'; 404 if ( (*realm)[len-1] == '.' ) 405 (*realm)[len-1] = '\0';
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_findrealm.c | 29 * the components of a principal (princ) but match on any realm. When a 30 * suitable entry is found return the entry's realm. 36 krb5_principal princ, krb5_data *realm) { 51 memcpy(&tmp_realm, &ent.principal->realm, sizeof (krb5_data)); 52 memcpy(&ent.principal->realm, &princ->realm, 57 /* Copy the realm back */ 58 memcpy(&ent.principal->realm, &tmp_realm, sizeof (krb5_data)); 63 * Copy its realm 66 &ent.principal->realm, real 35 krb5_kt_find_realm(krb5_context context, krb5_keytab keytab, krb5_principal princ, krb5_data *realm) argument [all...] |
H A D | ktfns.c | 63 if (krb5_is_referral_realm(&principal->realm)) { 64 char *realm; local 67 err = krb5_get_default_realm(context, &realm); 70 princ_data.realm.data = realm; 71 princ_data.realm.length = strlen(realm); 76 krb5_free_default_realm(context, princ_data.realm.data);
|
H A D | kt_solaris.c | 146 * e.g. host/<str15>.<domain>@<realm>. The realm name is determined by parsing 164 char **tprinc, *ptr, *token, *t_host = NULL, *realm; local 179 realm = krb5_princ_realm(ctx, f_princ)->data; 198 * host/str15.domain@realm 201 realm) + 1; 207 domain, realm); 352 * krb5_error_code k5_kt_remove_by_realm(krb5_context ctx, char *realm) 354 * Removes all key entries in the keytab file that match the exact realm name 358 * where realm i 364 k5_kt_remove_by_realm(krb5_context ctx, char *realm) argument [all...] |
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | kbind.c | 309 char realm[REALM_SZ], *cred, *krbinstance; local 313 if ( (err = krb_get_tf_realm( tkt_string(), realm )) != KSUCCESS ) { 328 if ( (err = krb_mk_req( &ktxt, service, krbinstance, realm, 0 ))
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_profile.c | 227 pkinit_libdefault_strings(krb5_context context, const krb5_data *realm, argument 236 if (realm != NULL && realm->length > sizeof(realmstr)-1) 239 if (realm != NULL) { 240 strncpy(realmstr, realm->data, realm->length); 241 realmstr[realm->length] = '\0'; 250 if (realm != NULL) { 310 pkinit_libdefault_string(krb5_context context, const krb5_data *realm, argument 316 retval = pkinit_libdefault_strings(context, realm, optio 333 pkinit_libdefault_boolean(krb5_context context, const krb5_data *realm, const char *option, int default_value, int *ret_value) argument 352 pkinit_libdefault_integer(krb5_context context, const krb5_data *realm, const char *option, int default_value, int *ret_value) argument [all...] |
/osnet-11/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 34 char *realm; member in struct:__anon54 42 char *passwd, char *realm ) 66 if (realm) 67 defaults->realm = realm; 69 ldap_get_option(ld, LDAP_OPT_X_SASL_REALM, &defaults->realm); 114 defvalue = defaults->realm;
|
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | kadm_host_srv_names.c | 19 * Find the admin server for the given realm. If the realm is null or 20 * the empty string, find the admin server for the default realm. 25 kadm5_get_master(krb5_context context, const char *realm, char **master) argument 40 if (realm == 0 || *realm == '\0') 44 realm ? realm : def_realm, 52 * Initialize realm info for (possible) DNS lookups. 54 dns_realm.data = strdup(realm 83 kadm5_get_kpasswd(krb5_context context, const char *realm, char **kpasswd) argument 167 kadm5_get_adm_host_srv_names(krb5_context context, const char *realm, char ***host_service_names) argument 215 kadm5_get_cpw_host_srv_names(krb5_context context, const char *realm, char ***host_service_names) argument 265 kadm5_get_kiprop_host_srv_names(krb5_context context, const char *realm, char ***host_service_names) argument 312 kadm5_is_master(krb5_context context, const char *realm, krb5_boolean *is_master, char **master_hostname) argument [all...] |
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 159 char *realm = NULL; local 254 if (realm) sasl_FREE(realm); 272 char *realm = NULL; local 340 if (realm) sasl_FREE(realm); 533 * count authid count password count service count realm
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_file.c | 561 smbfs_fh_ctx_create(smbfs_fh_ctx_t *fh_ctx, uint32_t flags, char *realm) argument 565 fh_ctx->sf_realm = realm;
|
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_kpasswd.c | 412 * Derives the Kerberos realm from the specified fqdn, and removes 413 * all keytab entries associated with that realm from the keytab file. 418 char *realm, *path; local 424 if ((realm = smb_krb5_domain2realm(fqdn)) == NULL) 427 kerr = k5_kt_remove_by_realm(ctx, realm); 428 free(realm); 610 char *realm = NULL; local 660 if ((realm = strdup(ad_domain)) == NULL) { 665 (void) smb_strupr(realm); 670 realm); [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 88 char *realm = salt->data; local 107 memcpy (password, realm, min (salt->length, 8)); 143 password[i] = realm[j];
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 110 if (!krb5_is_referral_realm(&mcreds->server->realm)) 114 * Retry using client's realm if service has referral realm. 116 tmprealm = mcreds->server->realm; 117 mcreds->server->realm = mcreds->client->realm; 119 mcreds->server->realm = tmprealm; 246 const krb5_data *realm; local 248 realm = krb5_princ_realm(context, principal); 250 if (realm [all...] |