host_princ 938 source3/include/includes.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype, bool no_salt); host_princ 948 source3/include/includes.h krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context, krb5_principal host_princ, int enctype); host_princ 536 source3/libads/kerberos.c krb5_principal host_princ, host_princ 548 source3/libads/kerberos.c if (smb_krb5_unparse_name(talloc_tos(), context, host_princ, &unparsed_name) != 0) { host_princ 301 source3/libads/kerberos_verify.c krb5_principal host_princ, host_princ 357 source3/libads/kerberos_verify.c if (create_kerberos_key_from_string(context, host_princ, &password, key, enctypes[i], false)) { host_princ 424 source3/libads/kerberos_verify.c krb5_principal host_princ = NULL; host_princ 478 source3/libads/kerberos_verify.c ret = smb_krb5_parse_name(context, host_princ_s, &host_princ); host_princ 505 source3/libads/kerberos_verify.c krb5_princ_component(context, host_princ, 0), host_princ 525 source3/libads/kerberos_verify.c host_princ, ticket, &tkt, &keyblock, &ret); host_princ 540 source3/libads/kerberos_verify.c host_princ, ticket, &tkt, &keyblock, &ret); host_princ 660 source3/libads/kerberos_verify.c if (host_princ) { host_princ 661 source3/libads/kerberos_verify.c krb5_free_principal(context, host_princ); host_princ 217 source3/libsmb/clikrb5.c krb5_principal host_princ, host_princ 226 source3/libsmb/clikrb5.c ret = krb5_principal2salt(context, host_princ, &salt); host_princ 239 source3/libsmb/clikrb5.c krb5_principal host_princ, host_princ 247 source3/libsmb/clikrb5.c ret = krb5_get_pw_salt(context, host_princ, &salt); host_princ 263 source3/libsmb/clikrb5.c krb5_principal host_princ, host_princ 286 source3/libsmb/clikrb5.c salt_princ = kerberos_fetch_salt_princ_for_host_princ(context, host_princ, enctype); host_princ 287 source3/libsmb/clikrb5.c ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype); host_princ 185 source3/smbd/sesssetup.c krb5_principal host_princ = NULL; host_princ 203 source3/smbd/sesssetup.c kerr = smb_krb5_parse_name(context, host_princ_s, &host_princ); host_princ 212 source3/smbd/sesssetup.c host_princ, &reply); host_princ 229 source3/smbd/sesssetup.c if (host_princ) { host_princ 230 source3/smbd/sesssetup.c krb5_free_principal(context, host_princ); host_princ 32 source4/auth/kerberos/clikrb5.c krb5_principal host_princ, host_princ 41 source4/auth/kerberos/clikrb5.c ret = krb5_principal2salt(context, host_princ, &salt); host_princ 53 source4/auth/kerberos/clikrb5.c krb5_principal host_princ, host_princ 61 source4/auth/kerberos/clikrb5.c ret = krb5_get_pw_salt(context, host_princ, &salt); host_princ 78 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); host_princ 79 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); host_princ 98 source4/auth/kerberos/kerberos.h krb5_principal host_princ,