/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | set_realm.c | 35 krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char *realm) argument 48 (void) free(krb5_princ_realm(context,principal)->data); 50 krb5_princ_realm(context, principal)->length = length; 51 krb5_princ_realm(context, principal)->data = newrealm;
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_repository.h | 45 char *principal; member in struct:krb5_repository_data
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_findrealm.c | 29 * the components of a principal (princ) but match on any realm. When a 51 memcpy(&tmp_realm, &ent.principal->realm, sizeof (krb5_data)); 52 memcpy(&ent.principal->realm, &princ->realm, 55 match = krb5_principal_compare(context, ent.principal, princ); 58 memcpy(&ent.principal->realm, &tmp_realm, sizeof (krb5_data)); 66 &ent.principal->realm, realm);
|
H A D | ktfr_entry.c | 40 krb5_free_principal(context, entry->principal);
|
H A D | ktfns.c | 57 krb5_const_principal principal, krb5_kvno vno, 63 if (krb5_is_referral_realm(&principal->realm)) { 65 princ_data = *principal; 66 principal = &princ_data; 73 err = krb5_x((keytab)->ops->get,(context, keytab, principal, vno, enctype, 75 if (principal == &princ_data) 56 krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
|
H A D | read_servi.c | 42 * routine opens the keytab and finds the principal associated with 43 * principal, vno, and enctype and returns the resulting key in *key 49 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 72 kerror = krb5_kt_get_entry(context, id, principal, vno, enctype, &entry);
|
H A D | kt_file.c | 262 krb5_const_principal principal, krb5_kvno kvno, 297 cur_entry.principal = 0; 309 /* if the principal isn't the one requested, free new_entry 319 if (!krb5_principal_compare_flags(context, principal, 320 new_entry.principal, 325 } else if (!krb5_principal_compare(context, principal, 326 new_entry.principal)) { 374 if (! cur_entry.principal || 403 if (cur_entry.principal) 902 krb5_principal_compare(context, entry->principal, cur_entr 261 krb5_ktfile_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument [all...] |
H A D | kt_memory.c | 52 * krb5_principal principal; principal of this key 383 krb5_const_principal principal, krb5_kvno kvno, 399 /* if the principal isn't the one requested, continue to the next. */ 401 if (!krb5_principal_compare(context, principal, entry->principal)) 449 match->principal, 450 &(out_entry->principal)); 522 err = krb5_copy_principal(context, mkt_cursor->entry->principal, 523 &(entry->principal)); 382 krb5_mkt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *out_entry) argument [all...] |
H A D | kt_srvtab.c | 166 krb5_ktsrvtab_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument 188 best_entry.principal = 0; 193 if (krb5_principal_compare(context, principal, ent.principal)) { 195 if (!best_entry.principal || (best_entry.vno < ent.vno)) { 212 if (best_entry.principal) 445 &ret_entry->principal); 455 krb5_free_principal(context, ret_entry->principal);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | kuserok.c | 122 "V5 krbtgt principal "), 201 * krb5_gsscred: Given a kerberos principal try to find the corresponding 206 krb5_gsscred(krb5_principal principal, uid_t *uid) argument 212 name_buf.value = &principal; 213 name_buf.length = sizeof (principal); 216 * Convert the kerb principal in to a gss name 243 * Given a Kerberos principal "principal", and a local username "luser", 253 * a matching principal name, instance, and realm. If one is found, 262 krb5_kuserok(krb5_context context, krb5_principal principal, cons argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 48 krb5_principal principal) 50 return cache->ops->init(context, cache, principal); 125 krb5_principal *principal) 127 return cache->ops->get_princ(context, cache, principal); 200 krb5_const_principal principal, 213 if (principal) { 214 ret = krb5_unparse_name(context, principal, &pname); 234 * \param principal principal to check if it a configuration principal 47 krb5_cc_initialize(krb5_context context, krb5_ccache cache, krb5_principal principal) argument 124 krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument 199 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument 243 krb5_is_config_principal(krb5_context context, krb5_const_principal principal) argument 277 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument 321 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *key, krb5_data *data) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_xdr.h | 9 krb5_const_principal principal);
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_xdr.h | 10 krb5_const_principal principal);
|
H A D | ldap_principal.c | 148 krb5_principal principal; local 210 if (krb5_parse_name(context, princ_name, &principal) != 0) 212 if (is_principal_in_realm(ldap_context, principal) == 0) { 213 if ((st = populate_krb5_db_entry(context, ldap_context, ld, ent, principal, 218 (void) krb5_free_principal(context, principal); 222 (void) krb5_free_principal(context, principal); 245 * delete a principal from the directory. 268 /* get the principal info */ 312 * If the Kerberos user principal to be deleted happens to be the last one associated 317 * NOTE: krbsecretkey attribute has per principal entrie [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | cred.c | 35 * __dh_gss_acquire_cred: Get the credential associated with principal 39 * Note in Diffie-Hellman the supplied principal name must be that of 49 gss_name_t principal, /* Requested principal */ 84 /* Get the principal name of the caller */ 89 * Diffie-Hellman requires the principal to be the principal 93 if (principal && 94 strncmp(netname, (char *)principal, MAXNETNAMELEN) != 0) { 110 dh_cred->principal 47 __dh_gss_acquire_cred( OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument [all...] |
H A D | validate.c | 108 * Check if a principal is valid. 115 __dh_validate_principal(dh_principal principal) argument
|
/osnet-11/usr/src/lib/krb5/kdb/ |
H A D | keytab.c | 119 krb5_ktkdb_get_entry(in_context, id, principal, kvno, enctype, entry) 122 krb5_const_principal principal; 141 xrealm_tgt = is_xrealm_tgt(context, principal); 148 kerror = krb5_db_get_principal(context, principal, & 202 kerror = krb5_copy_principal(context, principal, &entry->principal); 214 * is_xrealm_tgt: Returns true if the principal is a cross-realm TGT 215 * principal-- a principal with first component krbtgt and second
|
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | admin.h | 89 * The kadmin/admin principal is unused on Solaris. This principal is used 238 krb5_principal principal; member in struct:_kadm5_principal_ent_t 467 krb5_principal principal, 480 krb5_principal principal); 487 krb5_principal principal, 491 krb5_principal principal, 494 krb5_principal principal, 505 krb5_principal principal, 510 krb5_principal principal, [all...] |
H A D | server_internal.h | 87 krb5_principal principal); 88 kadm5_ret_t principal_exists(krb5_principal principal); 98 krb5_principal principal, krb5_db_entry *kdb,
|
/osnet-11/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss_utils.c | 141 * specific principal name (for the user name) in exported form. 144 __rpc_gss_get_principal_name(rpc_gss_principal_t *principal, char *mech, argument 154 *principal = NULL; 223 (*principal) = malloc(plen); 224 if ((*principal) == NULL) { 228 bzero((caddr_t)(*principal), plen); 229 (*principal)->len = RNDUP(name_buf.length); 230 s = (*principal)->name;
|
/osnet-11/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_misc.c | 138 krb5_principal principal) 179 int i, n = krb5_princ_size(handle->context, principal); 180 cp = krb5_princ_realm(handle->context, principal)->data; 184 cp = krb5_princ_component(handle->context, principal, i)->data; 136 passwd_check(kadm5_server_handle_t handle, char *password, int use_policy, kadm5_policy_ent_t pol, krb5_principal principal) argument
|
H A D | server_acl.c | 214 * entry ::= [<whitespace>] <principal> <whitespace> <opstring> 643 kadm5int_acl_find_entry(kcontext, principal, dest_princ) 645 krb5_principal principal; 678 &principal->realm, 0, (wildstate_t *)0) && 679 (entry->ae_principal->length == principal->length)) { 681 for (i=0; i<principal->length; i++) { 683 &principal->data[i], 0, &state)) { 693 /* We've matched the principal. If we have a target, then try it */ 787 * kadm5int_acl_check_krb() - Is this operation permitted for this principal? 790 kadm5int_acl_check_krb(kcontext, caller_princ, opmask, principal, restriction [all...] |
H A D | svr_principal.c | 279 * Check to see if the principal exists 281 ret = kdb_get_entry(handle, entry->principal, &kdb, &adb); 327 &polent, entry->principal); 392 principal. */ 395 entry->principal, &(kdb.princ)))) { 523 /* In all cases key and the principal data is set, let the database provider know */ 557 kadm5_delete_principal(void *server_handle, krb5_principal principal) argument 569 if (principal == NULL) 572 if ((ret = kdb_get_entry(handle, principal, &kdb, &adb))) 594 ret = kdb_delete_entry(handle, principal); 858 kadm5_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, long in_mask) argument 1399 kadm5_chpass_principal(void *server_handle, krb5_principal principal, char *password) argument 1408 kadm5_chpass_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char *password) argument 1614 kadm5_randkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock **keyblocks, int *n_keys) argument 1639 kadm5_randkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keyblocks, int *n_keys) argument 1920 kadm5_setkey_principal(void *server_handle, krb5_principal principal, krb5_keyblock *keyblocks, int n_keys) argument 1932 kadm5_setkey_principal_3(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock *keyblocks, int n_keys) argument 2297 kadm5_check_min_life(void *server_handle, krb5_principal principal, char *msg_ret, unsigned int msg_len) argument [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | rpcsec_gss_if.c | 154 char *principal, /* server service principal */ 163 return ((*calls.rpc_gss_seccreate)(clnt, principal, mechanism, 177 rpc_gss_principal_t *principal, 185 return ((*calls.rpc_gss_get_principal_name)(principal, mechanism, 223 char *principal, /* server service principal name */ 231 return ((*calls.rpc_gss_set_svc_name)(principal, mechanism, req_time, 152 rpc_gss_seccreate( CLIENT *clnt, char *principal, char *mechanism, rpc_gss_service_t service_type, char *qop, rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) argument 176 rpc_gss_get_principal_name( rpc_gss_principal_t *principal, char *mechanism, char *user_name, char *node, char *secdomain) argument 222 rpc_gss_set_svc_name( char *principal, char *mechanism, uint_t req_time, uint_t program, uint_t version) argument
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_util.c | 313 char *principal; local 316 if (asprintf(&principal, "%s@%s", ctx->ct_user, ctx->ct_realm) == -1) 319 DPRINT("user=%s, principal=%s, request=0x%08x", 320 ctx->ct_user, principal, ctx->ct_rflags); 321 rc = (force) ? smb_kinit_force(principal, ctx->ct_password) : 322 smb_kinit(principal, ctx->ct_password); 324 free(principal); 327 free(principal);
|