Lines Matching refs:rparams

137 static void print_realm_params(krb5_ldap_realm_params *rparams, int mask);
143 static int get_ticket_policy(krb5_ldap_realm_params *rparams, int *i, char *argv[],int argc);
150 static int get_ticket_policy(rparams,i,argv,argc) in get_ticket_policy() argument
151 krb5_ldap_realm_params *rparams; in get_ticket_policy()
174 rparams->max_life = date-now;
189 rparams->max_renewable_life = date-now;
193 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_POSTDATED);
195 rparams->tktflags |= KRB5_KDB_DISALLOW_POSTDATED;
202 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_FORWARDABLE);
205 rparams->tktflags |= KRB5_KDB_DISALLOW_FORWARDABLE;
212 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_RENEWABLE);
214 rparams->tktflags |= KRB5_KDB_DISALLOW_RENEWABLE;
221 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_PROXIABLE);
223 rparams->tktflags |= KRB5_KDB_DISALLOW_PROXIABLE;
230 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_DUP_SKEY);
232 rparams->tktflags |= KRB5_KDB_DISALLOW_DUP_SKEY;
241 rparams->tktflags |= KRB5_KDB_REQUIRES_PRE_AUTH;
243 rparams->tktflags &= (int)(~KRB5_KDB_REQUIRES_PRE_AUTH);
250 rparams->tktflags |= KRB5_KDB_REQUIRES_HW_AUTH;
252 rparams->tktflags &= (int)(~KRB5_KDB_REQUIRES_HW_AUTH);
259 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_SVR);
261 rparams->tktflags |= KRB5_KDB_DISALLOW_SVR;
268 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_TGT_BASED);
270 rparams->tktflags |= KRB5_KDB_DISALLOW_TGT_BASED;
277 rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_ALL_TIX);
279 rparams->tktflags |= KRB5_KDB_DISALLOW_ALL_TIX;
286 rparams->tktflags |= KRB5_KDB_REQUIRES_PWCHANGE;
288 rparams->tktflags &= (int)(~KRB5_KDB_REQUIRES_PWCHANGE);
295 rparams->tktflags |= KRB5_KDB_PWCHANGE_SERVICE;
297 rparams->tktflags &= (int)(~KRB5_KDB_PWCHANGE_SERVICE);
319 krb5_ldap_realm_params *rparams = NULL; local
339 rparams = (krb5_ldap_realm_params *)malloc(
341 if (rparams == NULL) {
345 memset(rparams, 0, sizeof(krb5_ldap_realm_params));
365 rparams->subtreecount=0;
366 while(list[rparams->subtreecount]!=NULL)
367 (rparams->subtreecount)++;
368 rparams->subtree = list;
377 rparams->subtree[rparams->subtreecount] = NULL;
390 rparams->containerref = strdup(argv[i]);
391 if (rparams->containerref == NULL) {
403 rparams->search_scope = 1;
405 rparams->search_scope = 2;
407 rparams->search_scope = atoi(argv[i]);
408 if ((rparams->search_scope != 1) &&
409 (rparams->search_scope != 2)) {
423 rparams->kdcservers = (char **)malloc(
425 if (rparams->kdcservers == NULL) {
429 memset(rparams->kdcservers, 0, sizeof(char*)*MAX_LIST_ENTRIES);
431 rparams->kdcservers))) {
438 rparams->adminservers = (char **)malloc(
440 if (rparams->adminservers == NULL) {
444 memset(rparams->adminservers, 0, sizeof(char*)*MAX_LIST_ENTRIES);
446 rparams->adminservers))) {
453 rparams->passwdservers = (char **)malloc(
455 if (rparams->passwdservers == NULL) {
459 memset(rparams->passwdservers, 0, sizeof(char*)*MAX_LIST_ENTRIES);
461 rparams->passwdservers))) {
469 } else if ((ret_mask= get_ticket_policy(rparams,&i,argv,argc)) !=0) {
515 rparams->mkey.enctype = global_params.enctype;
517 rparams->mkey.length = strlen(mkey_password) + 1;
518 rparams->mkey.contents = (krb5_octet *)strdup(mkey_password);
519 if (rparams->mkey.contents == NULL) {
524 rparams->realm_name = strdup(global_params.realm);
525 if (rparams->realm_name == NULL) {
611 /* global_params.realm, */ rparams, mask))) {
656 retval = krb5_c_string_to_key(util_context, rparams->mkey.enctype,
863 if ((rparams != NULL) && (rparams->kdcservers != NULL)) {
864 for (i=0; (rparams->kdcservers[i] != NULL); i++) {
866 LDAP_KDC_SERVICE, rparams->kdcservers[i],
867 rparams->realm_name, rparams->subtree, rightsmask)) != 0) {
871 rparams->realm_name);
880 if ((rparams != NULL) && (rparams->adminservers != NULL)) {
881 for (i=0; (rparams->adminservers[i] != NULL); i++) {
883 LDAP_ADMIN_SERVICE, rparams->adminservers[i],
884 rparams->realm_name, rparams->subtree, rightsmask)) != 0) {
888 rparams->realm_name);
897 if ((rparams != NULL) && (rparams->passwdservers != NULL)) {
898 for (i=0; (rparams->passwdservers[i] != NULL); i++) {
900 LDAP_PASSWD_SERVICE, rparams->passwdservers[i],
901 rparams->realm_name, rparams->subtree, rightsmask)) != 0) {
905 rparams->realm_name);
944 if (rparams)
945 krb5_ldap_free_realm_params(rparams);
973 krb5_ldap_realm_params *rparams = NULL; local
1014 global_params.realm, &rparams, &rmask);
1025 if (rparams->subtree) {
1027 oldsubtrees = (char **) calloc(rparams->subtreecount+1, sizeof(char *));
1032 for(k=0; rparams->subtree[k]!=NULL && rparams->subtreecount; k++) {
1033 oldsubtrees[k] = strdup(rparams->subtree[k]);
1040 for(k=0; k<rparams->subtreecount && rparams->subtree[k]; k++)
1041 free(rparams->subtree[k]);
1042 rparams->subtreecount=0;
1057 rparams->subtreecount=0;
1058 while(slist[rparams->subtreecount]!=NULL)
1059 (rparams->subtreecount)++;
1060 rparams->subtree = slist;
1069 rparams->subtree[rparams->subtreecount] = NULL;
1082 rparams->containerref = strdup(argv[i]);
1083 if (rparams->containerref == NULL) {
1095 rparams->search_scope = 1;
1097 rparams->search_scope = 2;
1099 rparams->search_scope = atoi(argv[i]);
1100 if ((rparams->search_scope != 1) &&
1101 (rparams->search_scope != 2)) {
1117 if ((rmask & LDAP_REALM_KDCSERVERS) && (rparams->kdcservers)) {
1126 for (j=0; rparams->kdcservers[j] != NULL; j++) {
1127 oldkdcdns[j] = strdup(rparams->kdcservers[j]);
1136 krb5_free_list_entries(rparams->kdcservers);
1137 free(rparams->kdcservers);
1140 rparams->kdcservers = (char **)malloc(
1142 if (rparams->kdcservers == NULL) {
1146 memset(rparams->kdcservers, 0, sizeof(char *)*MAX_LIST_ENTRIES);
1148 rparams->kdcservers))) {
1159 if ((!newkdcdn) && (rmask & LDAP_REALM_KDCSERVERS) && (rparams->kdcservers)) {
1168 for (j=0; rparams->kdcservers[j] != NULL; j++) {
1169 oldkdcdns[j] = strdup(rparams->kdcservers[j]);
1182 list_modify_str_array(&rparams->kdcservers, (const char **)list,
1191 if ((rmask & LDAP_REALM_KDCSERVERS) && (rparams->kdcservers) && (!oldkdcdns)) {
1199 for (j = 0; rparams->kdcservers[j] != NULL; j++) {
1200 oldkdcdns[j] = strdup(rparams->kdcservers[j]);
1213 existing_entries = list_count_str_array(rparams->kdcservers);
1217 rparams->kdcservers,
1223 rparams->kdcservers = tempstr;
1225 rparams->kdcservers = (char **)malloc(sizeof(char *) * (list_entries+1));
1226 if (rparams->kdcservers == NULL) {
1230 memset(rparams->kdcservers, 0, sizeof(char *) * (list_entries+1));
1232 list_modify_str_array(&rparams->kdcservers, (const char **)list,
1240 if ((rmask & LDAP_REALM_ADMINSERVERS) && (rparams->adminservers)) {
1249 for (j=0; rparams->adminservers[j] != NULL; j++) {
1250 oldadmindns[j] = strdup(rparams->adminservers[j]);
1259 krb5_free_list_entries(rparams->adminservers);
1260 free(rparams->adminservers);
1263 rparams->adminservers = (char **)malloc(
1265 if (rparams->adminservers == NULL) {
1269 memset(rparams->adminservers, 0, sizeof(char *)*MAX_LIST_ENTRIES);
1271 rparams->adminservers))) {
1283 if ((!newadmindn) && (rmask & LDAP_REALM_ADMINSERVERS) && (rparams->adminservers)) {
1292 for (j=0; rparams->adminservers[j] != NULL; j++) {
1293 oldadmindns[j] = strdup(rparams->adminservers[j]);
1306 list_modify_str_array(&rparams->adminservers, (const char **)list,
1315 if ((rmask & LDAP_REALM_ADMINSERVERS) && (rparams->adminservers) && (!oldadmindns)) {
1323 for (j=0; rparams->adminservers[j] != NULL; j++) {
1324 oldadmindns[j] = strdup(rparams->adminservers[j]);
1337 existing_entries = list_count_str_array(rparams->adminservers);
1341 rparams->adminservers,
1347 rparams->adminservers = tempstr;
1349 rparams->adminservers = (char **)malloc(sizeof(char *) * (list_entries+1));
1350 if (rparams->adminservers == NULL) {
1354 memset(rparams->adminservers, 0, sizeof(char *) * (list_entries+1));
1356 list_modify_str_array(&rparams->adminservers, (const char **)list,
1364 if ((rmask & LDAP_REALM_PASSWDSERVERS) && (rparams->passwdservers)) {
1373 for (j=0; rparams->passwdservers[j] != NULL; j++) {
1374 oldpwddns[j] = strdup(rparams->passwdservers[j]);
1383 krb5_free_list_entries(rparams->passwdservers);
1384 free(rparams->passwdservers);
1387 rparams->passwdservers = (char **)malloc(
1389 if (rparams->passwdservers == NULL) {
1393 memset(rparams->passwdservers, 0, sizeof(char *)*MAX_LIST_ENTRIES);
1395 rparams->passwdservers))) {
1407 if ((!newpwddn) && (rmask & LDAP_REALM_PASSWDSERVERS) && (rparams->passwdservers)) {
1416 for (j=0; rparams->passwdservers[j] != NULL; j++) {
1417 oldpwddns[j] = strdup(rparams->passwdservers[j]);
1430 list_modify_str_array(&rparams->passwdservers, (const char**)list,
1439 if ((rmask & LDAP_REALM_PASSWDSERVERS) && (rparams->passwdservers) && (!oldpwddns)) {
1447 for (j=0; rparams->passwdservers[j] != NULL; j++) {
1448 oldpwddns[j] = strdup(rparams->passwdservers[j]);
1461 existing_entries = list_count_str_array(rparams->passwdservers);
1465 rparams->passwdservers,
1471 rparams->passwdservers = tempstr;
1473 rparams->passwdservers = (char **)malloc(sizeof(char *) * (list_entries+1));
1474 if (rparams->passwdservers == NULL) {
1478 memset(rparams->passwdservers, 0, sizeof(char *) * (list_entries+1));
1480 list_modify_str_array(&rparams->passwdservers, (const char**)list,
1486 else if ((ret_mask= get_ticket_policy(rparams,&i,argv,argc)) !=0) {
1495 /* global_params.realm, */ rparams, mask))) {
1507 if (rparams->subtree != NULL) {
1508 for(i=0; rparams->subtree[i]!=NULL;i++) {
1509 oldsubtrees[i] = strdup(rparams->subtree[i]);
1521 newsubtrees = (char**) calloc(rparams->subtreecount, sizeof(char*));
1528 if ( (rparams != NULL) && (rparams->subtree != NULL) ) {
1529 for (j=0; j<rparams->subtreecount && rparams->subtree[j]!= NULL; j++) {
1530 newsubtrees[j] = strdup(rparams->subtree[j]);
1540 for(i=0; ( (oldsubtrees[j] && !rparams->subtree[i]) ||
1541 (!oldsubtrees[j] && rparams->subtree[i])); i++) {
1542 if(strcasecmp( oldsubtrees[j], rparams->subtree[i]) == 0) {
1564 if ((rparams != NULL) && (rparams->kdcservers != NULL)) {
1565 for (j=0; rparams->kdcservers[j]!= NULL; j++) {
1566 newkdcdns[j] = strdup(rparams->kdcservers[j]);
1586 if ((rparams != NULL) && (rparams->kdcservers != NULL)) {
1587 for (j=0; rparams->kdcservers[j]!= NULL; j++) {
1588 oldkdcdns[j] = strdup(rparams->kdcservers[j]);
1607 rparams->realm_name, oldsubtrees, rightsmask)) != 0) {
1611 rparams->realm_name);
1624 LDAP_KDC_SERVICE, newkdcdns[i], rparams->realm_name,
1625 rparams->subtree, rightsmask)) != 0) {
1629 rparams->realm_name);
1644 if ((rparams != NULL) && (rparams->adminservers != NULL)) {
1645 for (j=0; rparams->adminservers[j]!= NULL; j++) {
1646 newadmindns[j] = strdup(rparams->adminservers[j]);
1666 if ((rparams != NULL) && (rparams->adminservers != NULL)) {
1667 for (j=0; rparams->adminservers[j]!= NULL; j++) {
1668 oldadmindns[j] = strdup(rparams->adminservers[j]);
1688 rparams->realm_name, oldsubtrees, rightsmask)) != 0) {
1692 rparams->realm_name);
1707 rparams->realm_name, rparams->subtree, rightsmask)) != 0) {
1711 rparams->realm_name);
1727 if ((rparams != NULL) && (rparams->passwdservers != NULL)) {
1728 for (j=0; rparams->passwdservers[j]!= NULL; j++) {
1729 newpwddns[j] = strdup(rparams->passwdservers[j]);
1749 if ((rparams != NULL) && (rparams->passwdservers != NULL)) {
1750 for (j=0; rparams->passwdservers[j]!= NULL; j++) {
1751 oldpwddns[j] = strdup(rparams->passwdservers[j]);
1770 rparams->realm_name, oldsubtrees, rightsmask))) {
1774 rparams->realm_name);
1788 rparams->realm_name, rparams->subtree, rightsmask))) {
1792 rparams->realm_name);
1812 krb5_ldap_free_realm_params(rparams);
1882 krb5_ldap_realm_params *rparams = NULL; local
1908 global_params.realm, &rparams, &mask)) || (!rparams)) {
1915 print_realm_params(rparams, mask);
1916 krb5_ldap_free_realm_params(rparams);
1949 static void print_realm_params(krb5_ldap_realm_params *rparams, int mask) in print_realm_params() argument
1957 for (i=0; rparams->subtree[i]!=NULL; i++) in print_realm_params()
1958 printf("%25s: %-50s\n", gettext("Subtree"), rparams->subtree[i]); in print_realm_params()
1961 printf("%25s: %-50s\n", gettext("Principal Container Reference"), rparams->containerref); in print_realm_params()
1963 if ((rparams->search_scope != 1) && in print_realm_params()
1964 (rparams->search_scope != 2)) { in print_realm_params()
1968 (rparams->search_scope == 1) ? gettext("ONE") : gettext("SUB")); in print_realm_params()
1973 if (rparams->kdcservers != NULL) { in print_realm_params()
1975 for (slist = rparams->kdcservers; *slist != NULL; slist++) { in print_realm_params()
1988 if (rparams->adminservers != NULL) { in print_realm_params()
1990 for (slist = rparams->adminservers; *slist != NULL; slist++) { in print_realm_params()
2003 if (rparams->passwdservers != NULL) { in print_realm_params()
2005 for (slist = rparams->passwdservers; *slist != NULL; slist++) { in print_realm_params()
2018 printf(" %s \n", strdur(rparams->max_life)); in print_realm_params()
2023 printf(" %s \n", strdur(rparams->max_renewable_life)); in print_realm_params()
2027 int ticketflags = rparams->tktflags; in print_realm_params()
2494 krb5_ldap_realm_params *rparams = NULL; local
2562 rparams = ldap_context->lrparams;
2566 if ((rparams != NULL) && (rparams->kdcservers != NULL)) {
2567 for (i=0; (rparams->kdcservers[i] != NULL); i++) {
2569 LDAP_KDC_SERVICE, rparams->kdcservers[i],
2570 rparams->realm_name, rparams->subtree, rightsmask)) != 0) {
2574 rparams->realm_name);
2582 if ((rparams != NULL) && (rparams->adminservers != NULL)) {
2583 for (i=0; (rparams->adminservers[i] != NULL); i++) {
2585 LDAP_ADMIN_SERVICE, rparams->adminservers[i],
2586 rparams->realm_name, rparams->subtree, rightsmask)) != 0) {
2590 rparams->realm_name);
2598 if ((rparams != NULL) && (rparams->passwdservers != NULL)) {
2599 for (i=0; (rparams->passwdservers[i] != NULL); i++) {
2601 LDAP_PASSWD_SERVICE, rparams->passwdservers[i],
2602 rparams->realm_name, rparams->subtree, rightsmask)) != 0) {
2606 rparams->realm_name);