Lines Matching refs:st

150     krb5_error_code             st=0;
162 st = ENOMEM;
172 st = KRB5_KDB_SERVER_INTERNAL_ERR;
174 st = -1;
175 krb5_ldap_dal_err_funcp(context, krb5_err_have_str, st,
187 st = prof_get_integer_def (context, conf_section,
191 if (st)
196 st = EINVAL;
197 krb5_set_error_message (context, st,
218 st = prof_get_string_def (context, conf_section, name,
220 if (st)
234 st = profile_get_string (context->profile, KDB_MODULE_SECTION,
240 if (st)
244 st = profile_get_string (context->profile, KDB_MODULE_DEF_SECTION,
249 if (st)
267 st = prof_get_string_def (context, conf_section,
270 if (st)
288 st = ENOMEM;
292 if ((st=profile_get_string(context->profile, KDB_MODULE_SECTION, conf_section,
294 krb5_set_error_message (context, st, gettext("Error reading 'ldap_servers' attribute"));
304 st = ENOMEM;
309 st = ENOMEM;
321 st = ENOMEM;
326 st = ENOMEM;
339 return(st);
514 int st=0, i=0, subtreecount=0;
529 st = ENOMEM;
538 st = ENOMEM;
545 st = ENOMEM;
552 st = ENOMEM;
560 st = ENOMEM;
564 if ((st = remove_overlapping_subtrees(subtarr, newsubtree, &ncount,
579 if (st != 0) {
586 return st;
701 krb5_error_code st=-1;
741 st = 0;
742 return st;
759 st = 0;
760 return st;
794 st=0;
803 return st;
816 krb5_error_code st=0;
822 if (((st=krb5_dbe_lookup_tl_data(context, entries, &tl_data)) != 0) || tl_data.tl_data_length == 0)
832 return st;
873 krb5_error_code st=0;
879 if (((st=krb5_dbe_lookup_tl_data(context, entries, &tl_data)) != 0) || tl_data.tl_data_length == 0)
887 return st;
897 krb5_error_code st=0;
902 st = EINVAL;
907 if (((st=krb5_dbe_lookup_tl_data(context, entries, &tl_data)) != 0) || tl_data.tl_data_length == 0)
915 return st;
961 int st=0, one=1;
966 st = set_ldap_error(0, LDAP_NO_SUCH_OBJECT, OP_SEARCH);
967 return st;
973 if ((st = ldap_search_ext_s(ld,
984 st = set_ldap_error(0, st, OP_SEARCH);
985 return st;
1021 return st;
1040 int st=0;
1054 st = ldap_modify_ext_s(ld, dn, mods, NULL, NULL);
1060 if (st == LDAP_ALREADY_EXISTS || st == LDAP_TYPE_OR_VALUE_EXISTS)
1061 st = 0;
1063 if (st != 0) {
1064 st = set_ldap_error (0, st, OP_MOD);
1067 return st;
1085 krb5_error_code st=0;
1099 st = ldap_modify_ext_s(ld, dn, mods, NULL, NULL);
1102 if (st == LDAP_NO_SUCH_ATTRIBUTE || st == LDAP_UNDEFINED_TYPE)
1103 st = 0;
1105 if (st != 0) {
1106 st = set_ldap_error (0, st, OP_MOD);
1109 return st;
1219 krb5_error_code st=0;
1229 st = ENOMEM;
1237 st = ENOMEM;
1244 if (st != 0) {
1254 return st;
1316 krb5_error_code st=0;
1329 st = ENOMEM;
1333 return st;
1349 krb5_error_code st=0;
1364 st = ENOMEM;
1365 return st;
1370 st = ENOMEM;
1378 if (st != 0) {
1386 return st;
1398 krb5_error_code st=0;
1407 st = getepochtime(values[0], rettime);
1411 return st;
1456 krb5_error_code st=0;
1458 if ((st=krb5_add_member(mods, &i)) != 0)
1459 return st;
1503 krb5_error_code st=0;
1505 if ((st=krb5_add_member(mods, &i)) != 0)
1506 return st;
1553 krb5_error_code st=0;
1555 if ((st=krb5_add_member(mods, &i)) != 0)
1556 return st;
1585 krb5_error_code st=0;
1587 if ((st=krb5_add_member(mods, &i)) != 0)
1588 return st;
1669 int st = 0, tempst = 0, gothandle = 0;
1681 st = EINVAL;
1696 st = ENOMEM;
1702 st = ENOMEM;
1709 if ((st = krb5_get_subtree_info(ldap_context, &subtree, &ntrees)) != 0)
1725 st = translate_ldap_error (errcode, OP_SEARCH);
1754 return st;
1767 krb5_error_code st = 0;
1774 st = EINVAL;
1781 st = EINVAL;
1786 st = EINVAL;
1797 st = EINVAL;
1801 st = EINVAL;
1803 st = EINVAL;
1807 st = EINVAL;
1819 st = EINVAL;
1823 st = EINVAL;
1829 st = EINVAL;
1833 return st;
1843 krb5_error_code st = 0;
1851 st = EINVAL;
1858 st = ENOMEM;
1865 st = EINVAL;
1872 st = ENOMEM;
1881 st = ENOMEM;
1891 return st;
1968 krb5_error_code st = 0;
1981 st = EINVAL;
1984 if ((st=krb5_copy_principal(context, princ, &(entry->princ))) != 0)
1992 if ((st=krb5_unparse_name(context, princ, &user)) != 0)
2005 ldap_get_option(ld, LDAP_OPT_RESULT_CODE, &st);
2006 st = set_ldap_error(context, st, 0);
2014 if ((st=store_tl_data(&userinfo_tl_data, KDB_TL_PRINCTYPE,
2023 if (((st=store_tl_data(&userinfo_tl_data, KDB_TL_PRINCCOUNT, &pcount)) != 0) ||
2024 ((st=store_tl_data(&userinfo_tl_data, KDB_TL_USERDN, DN)) != 0))
2031 if ((st=krb5_ldap_get_time(ld, ent, "krbLastSuccessfulAuth",
2038 if ((st=krb5_ldap_get_time(ld, ent, "krbLastFailedAuth",
2064 if ((st=krb5_ldap_get_time(ld, ent, "krbprincipalexpiration", &(entry->expiration),
2071 if ((st=krb5_ldap_get_time(ld, ent, "krbpasswordexpiration", &(entry->pw_expiration),
2079 if ((st=krb5_ldap_get_string(ld, ent, "krbticketpolicyreference", &policydn,
2085 if ((st = krb5_ldap_policydn_to_name (context, policydn, &tktpolname)) != 0)
2090 if ((st=krb5_ldap_get_string(ld, ent, "krbpwdpolicyreference", &pwdpolicydn,
2100 if ((st = krb5_ldap_policydn_to_name (context, pwdpolicydn, &polname)) != 0)
2104 if ((st = krb5_update_tl_kadm_data(polname, &kadm_tl_data, entry->tl_data)) != 0) {
2113 if ((st=krb5_decode_krbsecretkey(context, entry, bvalues)) != 0)
2120 if ((st=krb5_ldap_get_time(ld, ent, "krbLastPwdChange",
2124 if ((st=krb5_dbe_update_last_pwd_change(context, entry,
2135 if ((st = krb5_ldap_get_strings(ld, ent, "krbobjectreferences",
2140 if ((st = store_tl_data(&userinfo_tl_data, KDB_TL_LINKDN,
2155 if ((st = berval2tl_data (ber_tl_data[i], &ptr)) != 0)
2157 if ((st = krb5_dbe_update_tl_data(context, entry, ptr)) != 0)
2168 if (st != 0)
2175 if ((st=store_tl_data(&userinfo_tl_data, KDB_TL_MASK, &mask)) != 0)
2177 if ((st=krb5_dbe_update_tl_data(context, entry, &userinfo_tl_data)) != 0)
2186 if ((st=krb5_ldap_get_time(ld, ent, "loginexpirationtime", &expiretime,
2200 if ((st=krb5_ldap_get_string(ld, ent, "logindisabled", &is_login_disabled,
2211 if ((st=krb5_read_tkt_policy (context, ldap_context, entry, tktpolname)) !=0)
2223 if ((st=krb5_ldap_get_password_policy(context, polname, &pwdpol, &cnt)) != 0)
2230 if ((st=krb5_dbe_lookup_last_pwd_change(context, entry, &last_pw_changed)) != 0)
2274 return (st);