Home
last modified time | relevance | path

Searched refs:principals (Results 1 – 25 of 37) sorted by relevance

12

/netbsd/crypto/external/bsd/openssh/dist/
H A Dsshsig.c761 principals, 0) != 1) { in parse_principals_key_and_options()
804 *principalsp = principals; in parse_principals_key_and_options()
817 free(principals); in parse_principals_key_and_options()
872 *principalsp = principals; in cert_filter_principals()
885 char *principals = NULL; in check_allowed_keys_line() local
965 *principalsp = principals; in check_allowed_keys_line()
968 free(principals); in check_allowed_keys_line()
1105 principals = tmp; in sshsig_match_principals()
1117 *principalsp = principals; in sshsig_match_principals()
1127 free(principals[i]); in sshsig_match_principals()
[all …]
H A Dsshkey.c547 free(cert->principals[i]); in cert_free()
548 free(cert->principals); in cert_free()
568 cert->principals = NULL; in cert_new()
1435 to->principals[i] = strdup(from->principals[i]); in sshkey_cert_copy()
1436 if (to->principals[i] == NULL) { in sshkey_cert_copy()
1767 while (sshbuf_len(principals) > 0) { in cert_parse()
1781 key->cert->principals = recallocarray(key->cert->principals, in cert_parse()
1844 sshbuf_free(principals); in cert_parse()
2140 struct sshbuf *principals = NULL; in sshkey_certify_custom() local
2204 k->cert->principals[i])) != 0) in sshkey_certify_custom()
[all …]
H A DPROTOCOL.certkeys85 string valid principals
105 string valid principals
125 string valid principals
142 string valid principals
176 "valid principals" is a string containing zero or more principals as
177 strings packed inside it. These principals list the names for which this
180 zero-length "valid principals" field means the certificate is valid for
H A Dauth2-pubkeyfile.c165 if ((result = match_list(cert->principals[i], in match_principals_option()
217 if (strcmp(cp, cert->principals[i]) != 0) in auth_check_principals_line()
220 loc, cert->principals[i]); in auth_check_principals_line()
H A Dssh-keygen.c1833 public->cert->principals = plist; in do_ca_sign()
2122 key->cert->principals[i]); in print_cert()
2861 char *principals = NULL, *cp, *tmp; in sig_find_principals() local
2880 verify_time, &principals)) != 0) { in sig_find_principals()
2889 tmp = principals; in sig_find_principals()
2898 free(principals); in sig_find_principals()
2907 char **principals = NULL; in sig_match_principals() local
2914 &principals, &nprincipals)) != 0) { in sig_match_principals()
2920 printf("%s\n", principals[i]); in sig_match_principals()
2921 free(principals[i]); in sig_match_principals()
[all …]
H A Dsshkey.h112 char **principals; member
H A DPROTOCOL.u2f107 string valid principals
125 string valid principals
H A Dsshconnect.c1466 host_key->cert->principals[i]); in verify_host_key()
/netbsd/crypto/external/bsd/heimdal/dist/doc/
H A Dkerberos4.texi20 First, Kerberos 4 and Kerberos 5 principals are different. A version 4
26 principal. One notable example is the ``host'' type principals, where
28 version 5 name is @samp{host}. For the class of principals that has a
44 simplest cases you can cover most principals with the first rule. If you
55 @code{krb5_425_conv_principal_ext} to convert principals when handling
70 be because these principals are not used anymore, or it might be just
75 principals @samp{rcmd.foo} and @samp{rcmd.bar}, where `foo' is a CNAME
76 for `bar', the resulting principals will be the same. Since the
90 you have a database that consists of the following principals:
95 lets say you also got these extra principals: @samp{rcmd.gone},
[all …]
H A Dwhatis.texi25 the network (users and services, usually called @dfn{principals}). All
26 principals share a secret password (or key) with the kerberos server and
27 this enables principals to verify that the messages from the kerberos
68 In Kerberos, principals use @dfn{tickets} to prove that they are who
76 checks that both @var{A} and @var{B} are valid principals.
78 Having verified the validity of the principals, it creates a packet
H A Dsetup.texi151 The keys of all the principals are stored in the database. If you
227 All modifications of principals are done with with kadmin.
300 check are for existence and flags on important principals. The
592 Then you need to create those principals that you added in the
701 kerberos principals using @file{kswitch} or built in support in
782 add the following principals to each realm. The principals should be
873 The goal is to allow principals in the @code{DSV.SU.SE} or
1315 the mapping in the principals entry in the kerberos database.
1358 certificates and principals to the CA.
1681 name_string = EXP:1, SEQUENCE:principals
[all …]
H A Dmigration.texi45 @item Convert the database, check all principals that hprop complains
H A Dapps.texi255 Support for 2b tokens in the kdc are turned on for specific principals
H A Dwin2k.texi68 A mapping between local NT users and Kerberos principals must be specified.
/netbsd/crypto/external/bsd/heimdal/dist/kadmin/
H A Dkadmin-commands.in110 …help = "Initializes the default principals for a realm. Creates the database\nif necessary. Local …
246 help = "Changes the password of one or more principals matching the expressions."
255 help = "Deletes all principals matching the expressions."
291 …help = "Extracts the keys of all principals matching the expressions, and stores them in a keytab.…
325 help = "Shows information about principals matching the expressions."
379 help = "allowed target principals"
455 help = "Lists principals in a terse format. Equivalent to \"get -t\"."
H A DChangeLog103 principals.
150 default. Return 1 on failure processing any of the principals.
153 the first error is returned when all principals are processed.
346 * mod.c: allow wildcarding principals, and make parameters a work
/netbsd/crypto/dist/ipsec-tools/src/racoon/samples/
H A Dracoon.conf.sample-gssapi29 # principals in your system's keytab. If you need to,
/netbsd/crypto/external/bsd/heimdal/dist/admin/
H A Dktutil-commands.in113 help = "Change keys for specified principals (default all)."
163 help = "Change keys for specified principals, and add them to the keytab."
/netbsd/crypto/external/bsd/heimdal/dist/tests/gss/
H A Dcheck-gssmask.in123 --principals=user1@${R}:u1 || exitcode=1
/netbsd/crypto/external/bsd/heimdal/dist/kdc/
H A Dkrb5tgs.c111 krb5_principals principals, in _kdc_add_KRB5SignedPath() argument
120 if (server && principals) { in _kdc_add_KRB5SignedPath()
121 ret = add_Principals(principals, server); in _kdc_add_KRB5SignedPath()
131 spd.delegated = principals; in _kdc_add_KRB5SignedPath()
158 sp.delegated = principals; in _kdc_add_KRB5SignedPath()
/netbsd/crypto/external/bsd/heimdal/dist/
H A DChangeLog.1999250 with empty principals so that they actually use an empty realm and
512 sysloging of number of principals transferred
515 principals
734 principals in some other realm. From Miroslav Ruda
1042 cache if the principals are different. close and NULL the old one
H A DChangeLog.1998619 * lib/kadm5/server.c: Check for principals changing their own
623 involved principals.
715 all principals matching an expression.
1518 principals.
1915 * kdc/kerberos4.c: Check database when converting v4 principals.
2120 principals in creds. Should also compare them with that received
2227 for this to work is that all involved principals has a des key in
H A DChangeLog.20031154 principals at the same time
1157 principals at the same time
1370 * admin/change.c (kt_change): collect all principals we are going
1497 flag before giving out v4 tickets for foreign v5 principals
/netbsd/crypto/external/bsd/heimdal/dist/lib/kadm5/
H A Dad.c1042 char ***principals, in kadm5_ad_get_principals() argument
/netbsd/external/bsd/openldap/dist/doc/drafts/
H A Ddraft-howard-rfc2307bis-xx.txt1055 such that hosts MAY be treated as authentication principals. The
1321 republishing DUA represents. (For example, principals outside an

12