/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/tests/ |
H A D | t_authdata.py | 13 out = realm.run(['./adata', realm.host_princ]) 70 realm.kinit('@%s' % realm.realm, flags=['-n']) 95 realm.extract_keytab(realm.krbtgt_princ, realm.keytab) 96 realm.extract_keytab(realm.host_princ, realm.keytab) 110 realm.kinit(realm.user_princ, None, ['-R', '-S', realm.host_princ]) 180 realm.run([kvno, realm.host_princ]) 188 realm.run([kvno, realm.host_princ]) 212 realm.extract_keytab(realm.krbtgt_princ, realm.keytab) 214 realm.extract_keytab(realm.user_princ, realm.keytab) 260 realm.kinit(realm.user_princ, None, [all …]
|
H A D | t_pkinit.py | 78 realm.kinit(realm.user_princ, 83 realm.kinit(realm.user_princ, 88 realm.kinit(realm.user_princ, 115 realm.klist(realm.user_princ) 127 realm.kinit('@%s' % realm.realm, flags=['-n']) 150 realm.kinit('@%s' % realm.realm, flags=['-n']) 151 realm.kinit('@%s' % realm.realm, flags=['-n', '-T', realm.ccache]) 177 realm.kinit(realm.user_princ, 180 realm.klist(realm.user_princ) 185 realm.kinit(realm.user_princ, [all …]
|
H A D | t_keytab.py | 5 realm.kinit(realm.host_princ, flags=['-k']) 14 realm.kinit(realm.host_princ, flags=['-k', '-t', pkeytab]) 23 realm.extract_keytab(realm.user_princ, realm.client_keytab); 25 realm.klist(realm.user_princ) 27 realm.kinit(realm.user_princ, flags=['-k', '-i']) 28 realm.klist(realm.user_princ) 36 realm.kinit(realm.host_princ, flags=['-t', realm.keytab], 38 realm.klist(realm.host_princ) 40 realm.kinit(realm.user_princ, flags=['-i'], 42 realm.klist(realm.user_princ) [all …]
|
H A D | t_policy.py | 62 realm.stop() 71 realm.run([kinit, realm.user_princ], input='wrong\n', expected_code=1, 73 realm.run([kinit, realm.user_princ], input='wrong\n', expected_code=1, 78 realm.run([kinit, realm.user_princ], expected_code=1, expected_msg=msg) 82 realm.kinit(realm.user_princ, password('user')) 86 realm.kinit(realm.user_princ, password('user')) 92 realm = K5Realm(start_kdc=False) variable 94 realm.run(['./hist', 'make']) 99 realm.run(['./hist', 'swap']) 107 realm.stop() [all …]
|
H A D | t_proxy.py | 55 conf.write('[%s]\n' % realm.realm) 72 realm.stop() 82 realm.stop() 92 realm.stop() 102 realm.stop() 112 realm.stop() 121 realm.run([kvno, realm.host_princ]) 124 realm.stop() 133 realm.run([kvno, realm.host_princ]) 136 realm.stop() [all …]
|
H A D | t_ccache.py | 39 realm.run([kdestroy]) 44 realm.kinit(realm.user_princ, password('user'), flags=['-c', 'testdir/xx/yy'], 50 realm.kinit(realm.user_princ, password('user')) 51 realm.run([klist, '-s']) 52 realm.kinit(realm.user_princ, password('user'), ['-l', '-1s']) 54 realm.kinit(realm.user_princ, password('user'), ['-S', 'kadmin/admin']) 56 realm.run([kdestroy]) 127 collection_test(realm, 'DIR:' + os.path.join(realm.testdir, 'cc')) 152 realm.kinit(realm.user_princ, password('user')) 163 realm.run([klist], expected_msg=realm.user_princ) [all …]
|
H A D | t_kdb.py | 313 realm.addprinc(realm.user_princ, password('user')) 314 realm.addprinc(realm.host_princ) 315 realm.extract_keytab(realm.host_princ, realm.keytab) 316 realm.kinit(realm.user_princ, password('user')) 317 realm.run([kvno, realm.host_princ]) 318 realm.klist(realm.user_princ, realm.host_princ) 382 realm.klist(realm.user_princ, 'alias@KRBTEST.COM') 395 realm.kinit(realm.user_princ, password('user')) 406 realm.klist(realm.user_princ, 'alias@KRBTEST.COM') 573 realm.kinit(realm.user_princ, password('user')) [all …]
|
H A D | t_kdcoptions.py | 44 realm.kinit(realm.user_princ, password('user'), flags) 45 check_flags(realm, realm.krbtgt_princ, expected_flag, expected_noflag) 51 realm.kinit(realm.user_princ, password('user'), kflags) 52 realm.run(['./gcred'] + gflags + ['unknown', realm.host_princ]) 53 check_flags(realm, realm.host_princ, expected_flag, expected_noflag) 56 realm = K5Realm() variable 61 realm.run([kadminl, 'modprinc', '-allow_proxiable', realm.user_princ]) 63 realm.run([kadminl, 'modprinc', '+allow_proxiable', realm.user_princ]) 64 realm.run([kadminl, 'modprinc', '-allow_proxiable', realm.krbtgt_princ]) 66 realm.run([kadminl, 'modprinc', '+allow_proxiable', realm.krbtgt_princ]) [all …]
|
H A D | t_keyrollover.py | 8 princ1 = 'host/test1@%s' % (realm.realm,) 9 princ2 = 'host/test2@%s' % (realm.realm,) 13 realm.run([kvno, realm.host_princ]) 22 realm.run([kadminl, 'purgekeys', realm.krbtgt_princ]) 27 (realm.realm, realm.realm, et, et) 31 realm.kinit(realm.user_princ, password('user')) 32 realm.run([kvno, realm.host_princ]) 35 (realm.realm, realm.realm) 45 realm.kinit(realm.user_princ, password('user')) 56 realm.run([kvno, realm.host_princ], expected_code=1) [all …]
|
/dports/security/krb5/krb5-1.19.2/src/tests/ |
H A D | t_pkinit.py | 78 realm.kinit(realm.user_princ, 83 realm.kinit(realm.user_princ, 88 realm.kinit(realm.user_princ, 115 realm.klist(realm.user_princ) 127 realm.kinit('@%s' % realm.realm, flags=['-n']) 153 realm.kinit('@%s' % realm.realm, flags=['-n']) 154 realm.kinit('@%s' % realm.realm, flags=['-n', '-T', realm.ccache]) 180 realm.kinit(realm.user_princ, 183 realm.klist(realm.user_princ) 195 realm.kinit(realm.user_princ, [all …]
|
H A D | t_authdata.py | 13 out = realm.run(['./adata', realm.host_princ]) 70 realm.kinit('@%s' % realm.realm, flags=['-n']) 95 realm.extract_keytab(realm.krbtgt_princ, realm.keytab) 96 realm.extract_keytab(realm.host_princ, realm.keytab) 110 realm.kinit(realm.user_princ, None, ['-R', '-S', realm.host_princ]) 180 realm.run([kvno, realm.host_princ]) 188 realm.run([kvno, realm.host_princ]) 212 realm.extract_keytab(realm.krbtgt_princ, realm.keytab) 214 realm.extract_keytab(realm.user_princ, realm.keytab) 260 realm.kinit(realm.user_princ, None, [all …]
|
H A D | t_keytab.py | 5 realm.kinit(realm.host_princ, flags=['-k']) 14 realm.kinit(realm.host_princ, flags=['-k', '-t', pkeytab]) 23 realm.extract_keytab(realm.user_princ, realm.client_keytab); 25 realm.klist(realm.user_princ) 27 realm.kinit(realm.user_princ, flags=['-k', '-i']) 28 realm.klist(realm.user_princ) 36 realm.kinit(realm.host_princ, flags=['-t', realm.keytab], 38 realm.klist(realm.host_princ) 40 realm.kinit(realm.user_princ, flags=['-i'], 42 realm.klist(realm.user_princ) [all …]
|
H A D | t_policy.py | 62 realm.stop() 71 realm.run([kinit, realm.user_princ], input='wrong\n', expected_code=1, 73 realm.run([kinit, realm.user_princ], input='wrong\n', expected_code=1, 78 realm.run([kinit, realm.user_princ], expected_code=1, expected_msg=msg) 82 realm.kinit(realm.user_princ, password('user')) 86 realm.kinit(realm.user_princ, password('user')) 92 realm = K5Realm(start_kdc=False) variable 94 realm.run(['./hist', 'make']) 99 realm.run(['./hist', 'swap']) 107 realm.stop() [all …]
|
H A D | t_proxy.py | 55 conf.write('[%s]\n' % realm.realm) 72 realm.stop() 82 realm.stop() 92 realm.stop() 102 realm.stop() 112 realm.stop() 121 realm.run([kvno, realm.host_princ]) 124 realm.stop() 133 realm.run([kvno, realm.host_princ]) 136 realm.stop() [all …]
|
H A D | t_ccache.py | 39 realm.run([kdestroy]) 44 realm.kinit(realm.user_princ, password('user'), flags=['-c', 'testdir/xx/yy'], 50 realm.kinit(realm.user_princ, password('user')) 51 realm.run([klist, '-s']) 52 realm.kinit(realm.user_princ, password('user'), ['-l', '-1s']) 54 realm.kinit(realm.user_princ, password('user'), ['-S', 'kadmin/admin']) 56 realm.run([kdestroy]) 127 collection_test(realm, 'DIR:' + os.path.join(realm.testdir, 'cc')) 152 realm.kinit(realm.user_princ, password('user')) 163 realm.run([klist], expected_msg=realm.user_princ) [all …]
|
H A D | t_kdb.py | 313 realm.addprinc(realm.user_princ, password('user')) 314 realm.addprinc(realm.host_princ) 315 realm.extract_keytab(realm.host_princ, realm.keytab) 316 realm.kinit(realm.user_princ, password('user')) 317 realm.run([kvno, realm.host_princ]) 318 realm.klist(realm.user_princ, realm.host_princ) 382 realm.klist(realm.user_princ, 'alias@KRBTEST.COM') 395 realm.kinit(realm.user_princ, password('user')) 406 realm.klist(realm.user_princ, 'alias@KRBTEST.COM') 579 realm.kinit(realm.user_princ, password('user')) [all …]
|
H A D | t_kdcoptions.py | 44 realm.kinit(realm.user_princ, password('user'), flags) 45 check_flags(realm, realm.krbtgt_princ, expected_flag, expected_noflag) 51 realm.kinit(realm.user_princ, password('user'), kflags) 52 realm.run(['./gcred'] + gflags + ['unknown', realm.host_princ]) 53 check_flags(realm, realm.host_princ, expected_flag, expected_noflag) 56 realm = K5Realm() variable 61 realm.run([kadminl, 'modprinc', '-allow_proxiable', realm.user_princ]) 63 realm.run([kadminl, 'modprinc', '+allow_proxiable', realm.user_princ]) 64 realm.run([kadminl, 'modprinc', '-allow_proxiable', realm.krbtgt_princ]) 66 realm.run([kadminl, 'modprinc', '+allow_proxiable', realm.krbtgt_princ]) [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/tests/gssapi/ |
H A D | t_gssapi.py | 6 realm.run(['./t_spnego','p:' + realm.host_princ, realm.keytab]) 7 realm.run(['./t_iov', 'p:' + realm.host_princ]) 8 realm.run(['./t_iov', '-s', 'p:' + realm.host_princ]) 9 realm.run(['./t_pcontok', 'p:' + realm.host_princ]) 12 realm = K5Realm() variable 54 realm.run(['./t_accname', 'p:' + realm.host_princ, 72 service_cs = 'service/cs@%s' % realm.realm 136 realm.extract_keytab(realm.user_princ, realm.client_keytab) 143 shutil.copyfile(realm.keytab, realm.client_keytab) 180 realm.run(['./t_err', 'p:' + realm.host_princ]) [all …]
|
H A D | t_client_keytab.py | 6 bob = 'bob@' + realm.realm 11 realm.env['HOME'] = realm.testdir 13 realm.extract_keytab(realm.user_princ, realm.client_keytab) 14 realm.extract_keytab(bob, realm.client_keytab) 30 realm.run(['./ccinit', realm.ccache, bob]) 44 realm.run(['./ccrefresh', realm.ccache, '1']) 46 out = realm.run(['./ccrefresh', realm.ccache]) 53 realm.klist(realm.user_princ) 57 realm.run(['./ccinit', realm.ccache, realm.host_princ]) 63 realm.run(['./ccinit', realm.ccache, bob]) [all …]
|
/dports/security/krb5/krb5-1.19.2/src/tests/gssapi/ |
H A D | t_gssapi.py | 6 realm.run(['./t_spnego','p:' + realm.host_princ, realm.keytab]) 7 realm.run(['./t_iov', 'p:' + realm.host_princ]) 8 realm.run(['./t_iov', '-s', 'p:' + realm.host_princ]) 9 realm.run(['./t_pcontok', 'p:' + realm.host_princ]) 58 realm.run(['./t_accname', 'p:' + realm.host_princ, 73 os.rename(realm.keytab, realm.keytab + '.save') 76 realm.extract_keytab(canonprinc, realm.keytab) 80 os.rename(realm.keytab + '.save', realm.keytab) 140 realm.extract_keytab(realm.user_princ, realm.client_keytab) 147 shutil.copyfile(realm.keytab, realm.client_keytab) [all …]
|
H A D | t_client_keytab.py | 6 bob = 'bob@' + realm.realm 11 realm.env['HOME'] = realm.testdir 13 realm.extract_keytab(realm.user_princ, realm.client_keytab) 14 realm.extract_keytab(bob, realm.client_keytab) 30 realm.run(['./ccinit', realm.ccache, bob]) 44 realm.run(['./ccrefresh', realm.ccache, '1']) 46 out = realm.run(['./ccrefresh', realm.ccache]) 53 realm.klist(realm.user_princ) 57 realm.run(['./ccinit', realm.ccache, realm.host_princ]) 63 realm.run(['./ccinit', realm.ccache, bob]) [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/appl/gss-sample/ |
H A D | t_gss_sample.py | 48 def ccache_savefile(realm): argument 52 def ccache_save(realm): argument 53 os.rename(realm.ccache, ccache_savefile(realm)) 56 def ccache_restore(realm): argument 57 shutil.copyfile(ccache_savefile(realm), realm.ccache) 61 ccache_restore(realm) 63 realm.klist(realm.user_princ, realm.host_princ) 91 realm.klist(realm.user_princ, realm.host_princ) 94 ccache_save(realm) 107 pw_test(realm, ['-dce']) [all …]
|
/dports/security/krb5/krb5-1.19.2/src/appl/gss-sample/ |
H A D | t_gss_sample.py | 48 def ccache_savefile(realm): argument 52 def ccache_save(realm): argument 53 os.rename(realm.ccache, ccache_savefile(realm)) 56 def ccache_restore(realm): argument 57 shutil.copyfile(ccache_savefile(realm), realm.ccache) 61 ccache_restore(realm) 63 realm.klist(realm.user_princ, realm.host_princ) 91 realm.klist(realm.user_princ, realm.host_princ) 94 ccache_save(realm) 107 pw_test(realm, ['-dce']) [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/lib/krb5/krb/ |
H A D | t_vfy_increds.py | 25 realm = K5Realm() variable 35 realm.run([kadminl, 'ktadd', realm.host_princ]) 42 realm.run([kadminl, 'change_password', '-randkey', realm.host_princ]) 81 realm.run([kadminl, 'addprinc', '-randkey', realm.nfs_princ]) 82 realm.run([kadminl, 'ktadd', realm.nfs_princ]) 85 realm.run(['./t_vfy_increds', realm.nfs_princ]) 86 realm.run(['./t_vfy_increds', '-n', realm.nfs_princ]) 92 realm.run([kadminl, 'change_password', '-randkey', realm.nfs_princ]) 95 realm.run(['./t_vfy_increds', realm.nfs_princ], expected_code=1) 96 realm.run(['./t_vfy_increds', '-n', realm.nfs_princ], expected_code=1) [all …]
|
/dports/security/krb5/krb5-1.19.2/src/lib/krb5/krb/ |
H A D | t_vfy_increds.py | 25 realm = K5Realm() variable 35 realm.run([kadminl, 'ktadd', realm.host_princ]) 42 realm.run([kadminl, 'change_password', '-randkey', realm.host_princ]) 81 realm.run([kadminl, 'addprinc', '-randkey', realm.nfs_princ]) 82 realm.run([kadminl, 'ktadd', realm.nfs_princ]) 85 realm.run(['./t_vfy_increds', realm.nfs_princ]) 86 realm.run(['./t_vfy_increds', '-n', realm.nfs_princ]) 92 realm.run([kadminl, 'change_password', '-randkey', realm.nfs_princ]) 95 realm.run(['./t_vfy_increds', realm.nfs_princ], expected_code=1) 96 realm.run(['./t_vfy_increds', '-n', realm.nfs_princ], expected_code=1) [all …]
|