Searched refs:realm (Results 1 - 25 of 329) sorted by relevance

1234567891011>>

/macosx-10.10.1/KerberosHelper-151/Source/
H A DlookupDSLocalKDC.h33 OSStatus DSCopyLocalKDC (CFStringRef *realm);
H A DcheckLocalKDC34 my $realm = `$dscl . -read /Config/KerberosKDC RealName | awk '{print \$2}'`;
35 chomp ($realm);
37 if ($realm eq "") {
42 if ($realm =~ /^.*LKDC:SHA1\.([0-9A-F]{40}).*$/) {
46 messageout("notLocalRealm", "This ($realm) is not a LocalKDC realm.");
57 messageout("nonMatchingCert", "The KDC certificate hash ($kdccerthash) does not match the realm ($realmhash).");
75 if ($ktentry =~ /^.*?aes.*?afpserver\/$realm\@$realm.*$/) {
83 my $kadmincheck = system("$kadmin -l check --ds-local $realm");
[all...]
H A DconfigureTestingLocalKDC8 my $realm = "/var/db/realm.local";
10 if (! -f $realm) {
14 open (REALM, '<'. $realm) or die "No realm";
H A DKerberosHelperContext.h35 char *realm; member in struct:realm_mappings
43 CFStringRef realm; /* calculated realmname */ member in struct:KRBhelperContext
H A DlookupDSLocalKDC.c41 OSStatus DSCopyLocalKDC (CFStringRef *realm) argument
50 if (NULL == realm) { err = paramErr; goto Error; }
52 *realm = NULL;
74 *realm = CFRetain (realmName);
88 #define kLocalKDCRealmFile "/var/db/realm.local"
94 OSStatus DSCopyLocalKDC (CFStringRef *realm) argument
101 if (NULL == realm) { err = paramErr; goto Error; }
103 *realm = NULL;
132 *realm = CFStringCreateWithCString (NULL, realmString, kCFStringEncodingASCII);
/macosx-10.10.1/MITKerberosShim-66/test/
H A Dtest-gss.sh4 realm="TEST.APPLE.COM"
24 kadmin="kadmin -l -r ${realm}"
29 echo "realm : ${realm}"
40 -e "s,[@]realm[@],${realm},g" \
52 --realm-max-ticket-life=1day \
53 --realm-max-renewable-life=1month \
54 "${realm}" || exit 1
56 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exi
[all...]
H A Dtest_get_user_name.c11 char *name, *instance, *realm; local
27 error = KLGetTripletFromPrincipal (principal, &name, &instance, &realm);
32 printf("name: %s instance: %s realm: %s cacheName: %s\n", name, instance, realm, cacheName);
36 KLDisposeString (realm);
H A Dtest-authen::krb5.pl34 my $server = $serverPrincipal->data . '@' . $serverPrincipal->realm;
35 my $client = $clientPrincipal->data . '@' . $clientPrincipal->realm;
46 my $realm = shift;
50 if ( defined($realm) && $realm ) {
51 printf("KrbConnect-getServiceRequestTicket: Set the default realm to '$realm'\n");
52 Authen::Krb5::set_default_realm($realm);
60 printf("getServiceRequestTicket: Default realm: %s\n", Authen::Krb5::get_default_realm() );
/macosx-10.10.1/ruby-106/ruby/lib/webrick/httpauth/
H A Duserdb.rb28 # Creates an obscured password in +realm+ with +user+ and +password+
31 def make_passwd(realm, user, pass)
32 @auth_type::make_passwd(realm, user, pass)
36 # Sets a password in +realm+ with +user+ and +password+ for the
39 def set_passwd(realm, user, pass)
44 # Retrieves a password in +realm+ for +user+ for the auth_type of this
47 def get_passwd(realm, user, reload_db=false)
48 make_passwd(realm, user, self[user])
H A Dhtdigest.rb19 # matched to a realm where they are valid. For security, the path for a
27 # htpasswd.set_passwd 'my realm', 'username', 'password'
56 user, realm, pass = line.split(/:/, 3)
57 unless @digest[realm]
58 @digest[realm] = Hash.new
60 @digest[realm][user] = pass
84 # Retrieves a password from the database for +user+ in +realm+. If
87 def get_passwd(realm, user, reload_db)
89 if hash = @digest[realm]
95 # Sets a password in the database for +user+ in +realm
[all...]
/macosx-10.10.1/OpenSSH-189/openssh/regress/
H A Dgssapi.sh4 realm="TEST.APPLE.COM"
24 kadmin="kadmin -l -r ${realm}"
34 -e "s,[@]realm[@],${realm},g" \
40 --realm-max-ticket-life=1day \
41 --realm-max-renewable-life=1month \
42 "${realm}" || exit 1
44 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exit 1
45 ${kadmin} add -r --use-defaults "host/${server}@${realm}" || exit 1
46 ${kadmin} ext_keytab "${user}@${realm}" || exi
[all...]
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/
H A Dappdefault.c38 krb5_const_realm realm, const char *option,
47 if(realm != NULL)
49 "realms", realm, option, NULL);
55 if(realm != NULL)
58 realm,
67 if(realm != NULL)
71 realm,
80 krb5_const_realm realm, const char *option,
88 if(realm != NULL)
90 "realms", realm, optio
37 krb5_appdefault_boolean(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, krb5_boolean def_val, krb5_boolean *ret_val) argument
79 krb5_appdefault_string(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, const char *def_val, char **ret_val) argument
123 krb5_appdefault_time(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, time_t def_val, time_t *ret_val) argument
[all...]
H A Dasn1_glue.c51 const Realm realm)
64 p->realm = strdup(realm);
65 if (p->realm == NULL) {
48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
H A Dset_default_realm.c38 add_default_realm(krb5_context context, void *userctx, krb5_const_realm realm) argument
41 heim_string_t s = heim_string_create(realm);
70 * Set the knowledge of the default realm(s) in context.
71 * If realm is not NULL, that's the new default realm.
72 * Otherwise, the realm(s) are figured out from plugin, configuration file or DNS.
75 * @param realm the new default realm or NULL for using configuration.
85 const char *realm)
94 if (realm
84 krb5_set_default_realm(krb5_context context, const char *realm) argument
[all...]
H A Dtest_x500.c44 const char *realm,
56 va_start(va, realm);
58 while (realm) {
60 inrealms[num_inrealms] = rk_UNCONST(realm);
62 realm = va_arg(va, const char *);
41 check_linear(krb5_context context, const char *client_realm, const char *server_realm, const char *realm, ...) argument
H A Dtest_alname.c38 test_alname(krb5_context context, krb5_const_realm realm, argument
47 ret = krb5_make_principal(context, &p, realm, user, inst, NULL);
102 krb5_realm realm; local
131 ret = krb5_get_default_realm(context, &realm);
135 test_alname(context, realm, user, NULL, user, 1);
136 test_alname(context, realm, user, "root", "root", 1);
141 test_alname(context, realm, user, NULL,
143 test_alname(context, realm, user, "root",
/macosx-10.10.1/ruby-106/ruby/lib/webrick/
H A Dhttpauth.rb26 # config = { :Realm => 'DigestAuth example realm' }
35 # realm for a server.
56 def _basic_auth(req, res, realm, req_field, res_field, err_type,
67 res[res_field] = "Basic realm=\"#{realm}\""
73 # called with a request +req+, response +res+, authentication +realm+ and
78 def basic_auth(req, res, realm, &block) # :yield: username, password
79 _basic_auth(req, res, realm, "Authorization", "WWW-Authenticate",
85 # When called with a request +req+, response +res+, authentication +realm+
90 def proxy_basic_auth(req, res, realm,
[all...]
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sasldb/
H A Dsasldb.h63 const char *realm,
71 const char *realm,
83 const char *realm,
112 const char *realm,
118 const char *realm,
123 char *realm, const size_t max_realm,
129 const char *realm,
/macosx-10.10.1/MITKerberosShim-66/mittestcc/
H A Dtest_ccapi_util.h9 cc_int32 new_v5_creds_union(cc_credentials_union *out_union, const char *realm);
/macosx-10.10.1/sudo-73/src/auth/
H A Dkerb4.c55 static char realm[REALM_SZ]; local
61 /* Get the local realm, or retrun failure (no krb.conf) */
62 if (krb_get_lrealm(realm, 1) != KSUCCESS)
65 /* Stash a pointer to the realm (used in kerb4_verify) */
66 auth->data = (void *) realm;
78 char *realm = (char *) auth->data; local
90 error = krb_get_pw_in_tkt(pw->pw_name, "", realm, "krbtgt", realm,
/macosx-10.10.1/Heimdal-398.1.2/kadmin/
H A Dcheck.c108 char *realm = NULL, *p, *p2; local
112 ret = krb5_get_default_realm(context, &realm);
118 realm = strdup(argv[0]);
119 if (realm == NULL) {
131 if (asprintf(&p, "%s/%s@%s", KRB5_TGS_NAME, realm, realm) == -1) {
138 printf("%s doesn't exist, are you sure %s is a realm in your database",
139 p, realm);
152 if (asprintf(&p, "kadmin/admin@%s", realm) == -1) {
174 if (asprintf(&p, "kadmin/changepw@%s", realm)
[all...]
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_ldap.c64 const char *realm
79 rc = lak_authenticate(lak, login, service, realm, password);
120 const char *realm __attribute__((unused))
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/Test/
H A DHandler.java10 String realm; field in class:Handler
17 public Handler(String authid, String userid, String password, String realm) argument
22 this.realm = realm;
78 if (realm!=null) {
79 c.setRealm(realm);
H A DServerHandler.java10 String realm; field in class:ServerHandler
17 public ServerHandler(String authid, String userid, String password, String realm) argument
22 this.realm = realm;
78 if (realm!=null) {
79 c.setRealm(realm);
/macosx-10.10.1/remote_cmds-47/rlogin.tproj/
H A Dkrcmd.c93 krcmd(ahost, rport, remuser, cmd, fd2p, realm)
98 char *realm;
114 realm,
134 krcmd_mutual(ahost, rport, remuser, cmd, fd2p, realm, cred, sched)
139 char *realm;
159 realm,

Completed in 230 milliseconds

1234567891011>>