/netbsd/crypto/external/bsd/openssh/dist/ |
H A D | sshsig.c | 761 principals, 0) != 1) { in parse_principals_key_and_options() 804 *principalsp = principals; in parse_principals_key_and_options() 817 free(principals); in parse_principals_key_and_options() 872 *principalsp = principals; in cert_filter_principals() 885 char *principals = NULL; in check_allowed_keys_line() local 965 *principalsp = principals; in check_allowed_keys_line() 968 free(principals); in check_allowed_keys_line() 1105 principals = tmp; in sshsig_match_principals() 1117 *principalsp = principals; in sshsig_match_principals() 1127 free(principals[i]); in sshsig_match_principals() [all …]
|
H A D | sshkey.c | 547 free(cert->principals[i]); in cert_free() 548 free(cert->principals); in cert_free() 568 cert->principals = NULL; in cert_new() 1435 to->principals[i] = strdup(from->principals[i]); in sshkey_cert_copy() 1436 if (to->principals[i] == NULL) { in sshkey_cert_copy() 1767 while (sshbuf_len(principals) > 0) { in cert_parse() 1781 key->cert->principals = recallocarray(key->cert->principals, in cert_parse() 1844 sshbuf_free(principals); in cert_parse() 2140 struct sshbuf *principals = NULL; in sshkey_certify_custom() local 2204 k->cert->principals[i])) != 0) in sshkey_certify_custom() [all …]
|
H A D | PROTOCOL.certkeys | 85 string valid principals 105 string valid principals 125 string valid principals 142 string valid principals 176 "valid principals" is a string containing zero or more principals as 177 strings packed inside it. These principals list the names for which this 180 zero-length "valid principals" field means the certificate is valid for
|
H A D | auth2-pubkeyfile.c | 165 if ((result = match_list(cert->principals[i], in match_principals_option() 217 if (strcmp(cp, cert->principals[i]) != 0) in auth_check_principals_line() 220 loc, cert->principals[i]); in auth_check_principals_line()
|
H A D | ssh-keygen.c | 1833 public->cert->principals = plist; in do_ca_sign() 2122 key->cert->principals[i]); in print_cert() 2861 char *principals = NULL, *cp, *tmp; in sig_find_principals() local 2880 verify_time, &principals)) != 0) { in sig_find_principals() 2889 tmp = principals; in sig_find_principals() 2898 free(principals); in sig_find_principals() 2907 char **principals = NULL; in sig_match_principals() local 2914 &principals, &nprincipals)) != 0) { in sig_match_principals() 2920 printf("%s\n", principals[i]); in sig_match_principals() 2921 free(principals[i]); in sig_match_principals() [all …]
|
H A D | sshkey.h | 112 char **principals; member
|
H A D | PROTOCOL.u2f | 107 string valid principals 125 string valid principals
|
H A D | sshconnect.c | 1466 host_key->cert->principals[i]); in verify_host_key()
|
/netbsd/crypto/external/bsd/heimdal/dist/doc/ |
H A D | kerberos4.texi | 20 First, Kerberos 4 and Kerberos 5 principals are different. A version 4 26 principal. One notable example is the ``host'' type principals, where 28 version 5 name is @samp{host}. For the class of principals that has a 44 simplest cases you can cover most principals with the first rule. If you 55 @code{krb5_425_conv_principal_ext} to convert principals when handling 70 be because these principals are not used anymore, or it might be just 75 principals @samp{rcmd.foo} and @samp{rcmd.bar}, where `foo' is a CNAME 76 for `bar', the resulting principals will be the same. Since the 90 you have a database that consists of the following principals: 95 lets say you also got these extra principals: @samp{rcmd.gone}, [all …]
|
H A D | whatis.texi | 25 the network (users and services, usually called @dfn{principals}). All 26 principals share a secret password (or key) with the kerberos server and 27 this enables principals to verify that the messages from the kerberos 68 In Kerberos, principals use @dfn{tickets} to prove that they are who 76 checks that both @var{A} and @var{B} are valid principals. 78 Having verified the validity of the principals, it creates a packet
|
H A D | setup.texi | 151 The keys of all the principals are stored in the database. If you 227 All modifications of principals are done with with kadmin. 300 check are for existence and flags on important principals. The 592 Then you need to create those principals that you added in the 701 kerberos principals using @file{kswitch} or built in support in 782 add the following principals to each realm. The principals should be 873 The goal is to allow principals in the @code{DSV.SU.SE} or 1315 the mapping in the principals entry in the kerberos database. 1358 certificates and principals to the CA. 1681 name_string = EXP:1, SEQUENCE:principals [all …]
|
H A D | migration.texi | 45 @item Convert the database, check all principals that hprop complains
|
H A D | apps.texi | 255 Support for 2b tokens in the kdc are turned on for specific principals
|
H A D | win2k.texi | 68 A mapping between local NT users and Kerberos principals must be specified.
|
/netbsd/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | kadmin-commands.in | 110 …help = "Initializes the default principals for a realm. Creates the database\nif necessary. Local … 246 help = "Changes the password of one or more principals matching the expressions." 255 help = "Deletes all principals matching the expressions." 291 …help = "Extracts the keys of all principals matching the expressions, and stores them in a keytab.… 325 help = "Shows information about principals matching the expressions." 379 help = "allowed target principals" 455 help = "Lists principals in a terse format. Equivalent to \"get -t\"."
|
H A D | ChangeLog | 103 principals. 150 default. Return 1 on failure processing any of the principals. 153 the first error is returned when all principals are processed. 346 * mod.c: allow wildcarding principals, and make parameters a work
|
/netbsd/crypto/dist/ipsec-tools/src/racoon/samples/ |
H A D | racoon.conf.sample-gssapi | 29 # principals in your system's keytab. If you need to,
|
/netbsd/crypto/external/bsd/heimdal/dist/admin/ |
H A D | ktutil-commands.in | 113 help = "Change keys for specified principals (default all)." 163 help = "Change keys for specified principals, and add them to the keytab."
|
/netbsd/crypto/external/bsd/heimdal/dist/tests/gss/ |
H A D | check-gssmask.in | 123 --principals=user1@${R}:u1 || exitcode=1
|
/netbsd/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | krb5tgs.c | 111 krb5_principals principals, in _kdc_add_KRB5SignedPath() argument 120 if (server && principals) { in _kdc_add_KRB5SignedPath() 121 ret = add_Principals(principals, server); in _kdc_add_KRB5SignedPath() 131 spd.delegated = principals; in _kdc_add_KRB5SignedPath() 158 sp.delegated = principals; in _kdc_add_KRB5SignedPath()
|
/netbsd/crypto/external/bsd/heimdal/dist/ |
H A D | ChangeLog.1999 | 250 with empty principals so that they actually use an empty realm and 512 sysloging of number of principals transferred 515 principals 734 principals in some other realm. From Miroslav Ruda 1042 cache if the principals are different. close and NULL the old one
|
H A D | ChangeLog.1998 | 619 * lib/kadm5/server.c: Check for principals changing their own 623 involved principals. 715 all principals matching an expression. 1518 principals. 1915 * kdc/kerberos4.c: Check database when converting v4 principals. 2120 principals in creds. Should also compare them with that received 2227 for this to work is that all involved principals has a des key in
|
H A D | ChangeLog.2003 | 1154 principals at the same time 1157 principals at the same time 1370 * admin/change.c (kt_change): collect all principals we are going 1497 flag before giving out v4 tickets for foreign v5 principals
|
/netbsd/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | ad.c | 1042 char ***principals, in kadm5_ad_get_principals() argument
|
/netbsd/external/bsd/openldap/dist/doc/drafts/ |
H A D | draft-howard-rfc2307bis-xx.txt | 1055 such that hosts MAY be treated as authentication principals. The 1321 republishing DUA represents. (For example, principals outside an
|