Lines Matching refs:st

153     krb5_error_code          st=0, tempst=0;
180 st = EINVAL;
181 krb5_set_error_message(context, st, gettext("Default realm not set"));
199 if ((st = krb5_get_subtree_info(ldap_context, &subtree, &ntree)) != 0)
216 if ((st = populate_krb5_db_entry(context, ldap_context, ld, ent, principal,
249 return st;
267 krb5_error_code st=0;
281 if ((st=krb5_ldap_get_principal(context, searchfor, &entries, nentries, &more)) != 0 || *nentries == 0)
284 if (((st=krb5_get_princ_type(context, &entries, &(ptype))) != 0) ||
285 ((st=krb5_get_attributes_mask(context, &entries, &(attrsetmask))) != 0) ||
286 ((st=krb5_get_princ_count(context, &entries, &(pcount))) != 0) ||
287 ((st=krb5_get_userdn(context, &entries, &(DN))) != 0))
291 st = EINVAL;
292 krb5_set_error_message(context, st, gettext("DN information missing"));
299 st = ldap_delete_ext_s(ld, DN, NULL, NULL);
300 if (st != LDAP_SUCCESS) {
301 st = set_ldap_error (context, st, OP_DEL);
305 if (((st=krb5_unparse_name(context, searchfor, &user)) != 0)
306 || ((st=krb5_ldap_unparse_principal_name(user)) != 0))
311 if ((st=krb5_add_str_mem_ldap_mod(&mods, "krbprincipalname", LDAP_MOD_DELETE,
318 if ((st=krb5_add_ber_mem_ldap_mod(&mods, "krbprincipalkey", LDAP_MOD_DELETE | LDAP_MOD_BVALUES,
334 if ((st=krb5_add_str_mem_ldap_mod(&mods, attributes_set[j], LDAP_MOD_DELETE,
348 if ((st=checkattributevalue(ld, DN, "objectclass", attrvalues, &amask)) != 0)
356 if ((st=krb5_add_str_mem_ldap_mod(&mods, "objectclass", LDAP_MOD_DELETE,
362 st=ldap_modify_ext_s(ld, DN, mods, NULL, NULL);
363 if (st != LDAP_SUCCESS) {
364 st = set_ldap_error(context, st, OP_MOD);
387 if (st == 0)
392 return st;
412 krb5_error_code st=0;
418 st = ENOMEM;
425 st = ENOMEM;
456 return st;
480 krb5_error_code st = 0;
487 st = ENOMEM;
495 st = ENOMEM;
510 st = ENOMEM;
536 return st;