/macosx-10.10.1/KerberosHelper-151/Source/ |
H A D | lookupDSLocalKDC.h | 33 OSStatus DSCopyLocalKDC (CFStringRef *realm);
|
H A D | checkLocalKDC | 34 my $realm = `$dscl . -read /Config/KerberosKDC RealName | awk '{print \$2}'`; 35 chomp ($realm); 37 if ($realm eq "") { 42 if ($realm =~ /^.*LKDC:SHA1\.([0-9A-F]{40}).*$/) { 46 messageout("notLocalRealm", "This ($realm) is not a LocalKDC realm."); 57 messageout("nonMatchingCert", "The KDC certificate hash ($kdccerthash) does not match the realm ($realmhash)."); 75 if ($ktentry =~ /^.*?aes.*?afpserver\/$realm\@$realm.*$/) { 83 my $kadmincheck = system("$kadmin -l check --ds-local $realm"); [all...] |
H A D | configureTestingLocalKDC | 8 my $realm = "/var/db/realm.local"; 10 if (! -f $realm) { 14 open (REALM, '<'. $realm) or die "No realm";
|
H A D | KerberosHelperContext.h | 35 char *realm; member in struct:realm_mappings 43 CFStringRef realm; /* calculated realmname */ member in struct:KRBhelperContext
|
H A D | lookupDSLocalKDC.c | 41 OSStatus DSCopyLocalKDC (CFStringRef *realm) argument 50 if (NULL == realm) { err = paramErr; goto Error; } 52 *realm = NULL; 74 *realm = CFRetain (realmName); 88 #define kLocalKDCRealmFile "/var/db/realm.local" 94 OSStatus DSCopyLocalKDC (CFStringRef *realm) argument 101 if (NULL == realm) { err = paramErr; goto Error; } 103 *realm = NULL; 132 *realm = CFStringCreateWithCString (NULL, realmString, kCFStringEncodingASCII);
|
/macosx-10.10.1/MITKerberosShim-66/test/ |
H A D | test-gss.sh | 4 realm="TEST.APPLE.COM" 24 kadmin="kadmin -l -r ${realm}" 29 echo "realm : ${realm}" 40 -e "s,[@]realm[@],${realm},g" \ 52 --realm-max-ticket-life=1day \ 53 --realm-max-renewable-life=1month \ 54 "${realm}" || exit 1 56 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exi [all...] |
H A D | test_get_user_name.c | 11 char *name, *instance, *realm; local 27 error = KLGetTripletFromPrincipal (principal, &name, &instance, &realm); 32 printf("name: %s instance: %s realm: %s cacheName: %s\n", name, instance, realm, cacheName); 36 KLDisposeString (realm);
|
H A D | test-authen::krb5.pl | 34 my $server = $serverPrincipal->data . '@' . $serverPrincipal->realm; 35 my $client = $clientPrincipal->data . '@' . $clientPrincipal->realm; 46 my $realm = shift; 50 if ( defined($realm) && $realm ) { 51 printf("KrbConnect-getServiceRequestTicket: Set the default realm to '$realm'\n"); 52 Authen::Krb5::set_default_realm($realm); 60 printf("getServiceRequestTicket: Default realm: %s\n", Authen::Krb5::get_default_realm() );
|
/macosx-10.10.1/ruby-106/ruby/lib/webrick/httpauth/ |
H A D | userdb.rb | 28 # Creates an obscured password in +realm+ with +user+ and +password+ 31 def make_passwd(realm, user, pass) 32 @auth_type::make_passwd(realm, user, pass) 36 # Sets a password in +realm+ with +user+ and +password+ for the 39 def set_passwd(realm, user, pass) 44 # Retrieves a password in +realm+ for +user+ for the auth_type of this 47 def get_passwd(realm, user, reload_db=false) 48 make_passwd(realm, user, self[user])
|
H A D | htdigest.rb | 19 # matched to a realm where they are valid. For security, the path for a 27 # htpasswd.set_passwd 'my realm', 'username', 'password' 56 user, realm, pass = line.split(/:/, 3) 57 unless @digest[realm] 58 @digest[realm] = Hash.new 60 @digest[realm][user] = pass 84 # Retrieves a password from the database for +user+ in +realm+. If 87 def get_passwd(realm, user, reload_db) 89 if hash = @digest[realm] 95 # Sets a password in the database for +user+ in +realm [all...] |
/macosx-10.10.1/OpenSSH-189/openssh/regress/ |
H A D | gssapi.sh | 4 realm="TEST.APPLE.COM" 24 kadmin="kadmin -l -r ${realm}" 34 -e "s,[@]realm[@],${realm},g" \ 40 --realm-max-ticket-life=1day \ 41 --realm-max-renewable-life=1month \ 42 "${realm}" || exit 1 44 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exit 1 45 ${kadmin} add -r --use-defaults "host/${server}@${realm}" || exit 1 46 ${kadmin} ext_keytab "${user}@${realm}" || exi [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | appdefault.c | 38 krb5_const_realm realm, const char *option, 47 if(realm != NULL) 49 "realms", realm, option, NULL); 55 if(realm != NULL) 58 realm, 67 if(realm != NULL) 71 realm, 80 krb5_const_realm realm, const char *option, 88 if(realm != NULL) 90 "realms", realm, optio 37 krb5_appdefault_boolean(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, krb5_boolean def_val, krb5_boolean *ret_val) argument 79 krb5_appdefault_string(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, const char *def_val, char **ret_val) argument 123 krb5_appdefault_time(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, time_t def_val, time_t *ret_val) argument [all...] |
H A D | asn1_glue.c | 51 const Realm realm) 64 p->realm = strdup(realm); 65 if (p->realm == NULL) { 48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
|
H A D | set_default_realm.c | 38 add_default_realm(krb5_context context, void *userctx, krb5_const_realm realm) argument 41 heim_string_t s = heim_string_create(realm); 70 * Set the knowledge of the default realm(s) in context. 71 * If realm is not NULL, that's the new default realm. 72 * Otherwise, the realm(s) are figured out from plugin, configuration file or DNS. 75 * @param realm the new default realm or NULL for using configuration. 85 const char *realm) 94 if (realm 84 krb5_set_default_realm(krb5_context context, const char *realm) argument [all...] |
H A D | test_x500.c | 44 const char *realm, 56 va_start(va, realm); 58 while (realm) { 60 inrealms[num_inrealms] = rk_UNCONST(realm); 62 realm = va_arg(va, const char *); 41 check_linear(krb5_context context, const char *client_realm, const char *server_realm, const char *realm, ...) argument
|
H A D | test_alname.c | 38 test_alname(krb5_context context, krb5_const_realm realm, argument 47 ret = krb5_make_principal(context, &p, realm, user, inst, NULL); 102 krb5_realm realm; local 131 ret = krb5_get_default_realm(context, &realm); 135 test_alname(context, realm, user, NULL, user, 1); 136 test_alname(context, realm, user, "root", "root", 1); 141 test_alname(context, realm, user, NULL, 143 test_alname(context, realm, user, "root",
|
/macosx-10.10.1/ruby-106/ruby/lib/webrick/ |
H A D | httpauth.rb | 26 # config = { :Realm => 'DigestAuth example realm' } 35 # realm for a server. 56 def _basic_auth(req, res, realm, req_field, res_field, err_type, 67 res[res_field] = "Basic realm=\"#{realm}\"" 73 # called with a request +req+, response +res+, authentication +realm+ and 78 def basic_auth(req, res, realm, &block) # :yield: username, password 79 _basic_auth(req, res, realm, "Authorization", "WWW-Authenticate", 85 # When called with a request +req+, response +res+, authentication +realm+ 90 def proxy_basic_auth(req, res, realm, [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sasldb/ |
H A D | sasldb.h | 63 const char *realm, 71 const char *realm, 83 const char *realm, 112 const char *realm, 118 const char *realm, 123 char *realm, const size_t max_realm, 129 const char *realm,
|
/macosx-10.10.1/MITKerberosShim-66/mittestcc/ |
H A D | test_ccapi_util.h | 9 cc_int32 new_v5_creds_union(cc_credentials_union *out_union, const char *realm);
|
/macosx-10.10.1/sudo-73/src/auth/ |
H A D | kerb4.c | 55 static char realm[REALM_SZ]; local 61 /* Get the local realm, or retrun failure (no krb.conf) */ 62 if (krb_get_lrealm(realm, 1) != KSUCCESS) 65 /* Stash a pointer to the realm (used in kerb4_verify) */ 66 auth->data = (void *) realm; 78 char *realm = (char *) auth->data; local 90 error = krb_get_pw_in_tkt(pw->pw_name, "", realm, "krbtgt", realm,
|
/macosx-10.10.1/Heimdal-398.1.2/kadmin/ |
H A D | check.c | 108 char *realm = NULL, *p, *p2; local 112 ret = krb5_get_default_realm(context, &realm); 118 realm = strdup(argv[0]); 119 if (realm == NULL) { 131 if (asprintf(&p, "%s/%s@%s", KRB5_TGS_NAME, realm, realm) == -1) { 138 printf("%s doesn't exist, are you sure %s is a realm in your database", 139 p, realm); 152 if (asprintf(&p, "kadmin/admin@%s", realm) == -1) { 174 if (asprintf(&p, "kadmin/changepw@%s", realm) [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_ldap.c | 64 const char *realm 79 rc = lak_authenticate(lak, login, service, realm, password); 120 const char *realm __attribute__((unused))
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/Test/ |
H A D | Handler.java | 10 String realm; field in class:Handler 17 public Handler(String authid, String userid, String password, String realm) argument 22 this.realm = realm; 78 if (realm!=null) { 79 c.setRealm(realm);
|
H A D | ServerHandler.java | 10 String realm; field in class:ServerHandler 17 public ServerHandler(String authid, String userid, String password, String realm) argument 22 this.realm = realm; 78 if (realm!=null) { 79 c.setRealm(realm);
|
/macosx-10.10.1/remote_cmds-47/rlogin.tproj/ |
H A D | krcmd.c | 93 krcmd(ahost, rport, remuser, cmd, fd2p, realm) 98 char *realm; 114 realm, 134 krcmd_mutual(ahost, rport, remuser, cmd, fd2p, realm, cred, sched) 139 char *realm; 159 realm,
|