Lines Matching refs:subtree

41     {"1#subtree#","#[Entry Rights]"},
42 {"2#subtree#","#ObjectClass"},
43 {"2#subtree#","#krbTicketPolicyReference"},
44 {"2#subtree#","#krbUPEnabled"},
45 {"2#subtree#","#krbHostServer"},
46 {"2#subtree#","#krbRealmReferences"},
47 {"2#subtree#","#krbTicketFlags"},
48 {"2#subtree#","#krbMaxTicketLife"},
49 {"2#subtree#","#krbMaxRenewableAge"},
50 {"2#subtree#","#krbPrincipalName"},
51 {"2#subtree#","#krbPrincipalKey"},
52 {"2#subtree#","#krbPrincipalExpiration"},
53 {"2#subtree#","#krbPwdPolicyReference"},
54 {"2#subtree#","#krbMaxPwdLife"},
55 {"2#subtree#","#krbObjectReferences"},
56 {"2#subtree#","#krbLastPwdChange"},
57 {"6#subtree#","#krbExtraData"},
58 {"2#subtree#","#krbPasswordExpiration"},
59 {"6#subtree#","#krbLastFailedAuth"},
60 {"6#subtree#","#krbLoginFailedCount"},
61 {"6#subtree#","#krbLastSuccessfulAuth"},
66 {"15#subtree#","#[Entry Rights]"},
67 {"6#subtree#","#ObjectClass"},
68 {"6#subtree#","#krbTicketPolicyReference"},
69 {"6#subtree#","#krbUPEnabled"},
70 {"2#subtree#","#krbHostServer"},
71 {"2#subtree#","#krbRealmReferences"},
72 {"6#subtree#","#krbTicketFlags"},
73 {"6#subtree#","#krbMaxTicketLife"},
74 {"6#subtree#","#krbMaxRenewableAge"},
75 {"6#subtree#","#krbPrincipalName"},
76 {"6#subtree#","#krbPrincipalKey"},
77 {"6#subtree#","#krbPrincipalExpiration"},
78 {"6#subtree#","#krbPwdHistoryLength"},
79 {"6#subtree#","#krbMinPwdLife"},
80 {"6#subtree#","#krbMaxPwdLife"},
81 {"6#subtree#","#krbPwdMinDiffChars"},
82 {"6#subtree#","#krbPwdMinLength"},
83 {"6#subtree#","#krbPwdPolicyReference"},
84 {"6#subtree#","#krbLastPwdChange"},
85 {"6#subtree#","#krbObjectReferences"},
86 {"6#subtree#","#krbExtraData"},
87 {"6#subtree#","#krbPasswordExpiration"},
88 {"2#subtree#","#krbLastFailedAuth"},
89 {"2#subtree#","#krbLoginFailedCount"},
90 {"2#subtree#","#krbLastSuccessfulAuth"},
91 {"6#subtree#","#krbPwdMaxFailure"},
92 {"6#subtree#","#krbPwdFailureCountInterval"},
93 {"6#subtree#","#krbPwdLockoutDuration"},
98 {"1#subtree#","#[Entry Rights]"},
99 {"2#subtree#","#ObjectClass"},
100 {"2#subtree#","#krbTicketPolicyReference"},
101 {"2#subtree#","#krbUPEnabled"},
102 {"2#subtree#","#krbHostServer"},
103 {"2#subtree#","#krbRealmReferences"},
104 {"6#subtree#","#krbTicketFlags"},
105 {"2#subtree#","#krbMaxTicketLife"},
106 {"2#subtree#","#krbMaxRenewableAge"},
107 {"2#subtree#","#krbPrincipalName"},
108 {"6#subtree#","#krbPrincipalKey"},
109 {"2#subtree#","#krbPrincipalExpiration"},
110 {"2#subtree#","#krbPwdHistoryLength"},
111 {"2#subtree#","#krbMinPwdLife"},
112 {"2#subtree#","#krbMaxPwdLife"},
113 {"2#subtree#","#krbPwdMinDiffChars"},
114 {"2#subtree#","#krbPwdMinLength"},
115 {"2#subtree#","#krbPwdPolicyReference"},
116 {"6#subtree#","#krbLastPwdChange"},
117 {"2#subtree#","#krbObjectReferences"},
118 {"6#subtree#","#krbExtraData"},
119 {"6#subtree#","#krbPasswordExpiration"},
120 {"2#subtree#","#krbLastFailedAuth"},
121 {"2#subtree#","#krbLoginFailedCount"},
122 {"2#subtree#","#krbLastSuccessfulAuth"},
123 {"2#subtree#","#krbPwdMaxFailure"},
124 {"2#subtree#","#krbPwdFailureCountInterval"},
125 {"2#subtree#","#krbPwdLockoutDuration"},
130 {"1#subtree#","#[Entry Rights]"},
131 {"2#subtree#","#CN"},
132 {"2#subtree#","#ObjectClass"},
133 {"2#subtree#","#krbTicketPolicyReference"},
134 {"2#subtree#","#krbMKey"},
135 {"2#subtree#","#krbUPEnabled"},
136 {"2#subtree#","#krbSubTrees"},
137 {"2#subtree#","#krbPrincContainerRef"},
138 {"2#subtree#","#krbSearchScope"},
139 {"2#subtree#","#krbLdapServers"},
140 {"2#subtree#","#krbKdcServers"},
141 {"2#subtree#","#krbAdmServers"},
142 {"2#subtree#","#krbPwdServers"},
143 {"2#subtree#","#krbTicketFlags"},
144 {"2#subtree#","#krbMaxTicketLife"},
145 {"2#subtree#","#krbMaxRenewableAge"},
146 {"2#subtree#","#krbPrincipalName"},
147 {"2#subtree#","#krbPrincipalKey"},
148 {"2#subtree#","#krbPrincipalExpiration"},
149 {"2#subtree#","#krbPwdPolicyReference"},
150 {"2#subtree#","#krbMaxPwdLife"},
151 {"2#subtree#","#krbObjectReferences"},
152 {"2#subtree#","#krbLastPwdChange"},
153 {"6#subtree#","#krbExtraData"},
154 {"2#subtree#","#krbPasswordExpiration"},
155 {"2#subtree#","#krbDefaultEncSaltTypes"},
156 {"6#subtree#","#krbLastFailedAuth"},
157 {"6#subtree#","#krbLoginFailedCount"},
158 {"6#subtree#","#krbLastSuccessfulAuth"},
164 {"15#subtree#","#[Entry Rights]"},
165 {"6#subtree#","#CN"},
166 {"6#subtree#","#ObjectClass"},
167 {"6#subtree#","#krbTicketPolicyReference"},
168 {"2#subtree#","#krbMKey"},
169 {"6#subtree#","#krbUPEnabled"},
170 {"2#subtree#","#krbSubTrees"},
171 {"2#subtree#","#krbPrincContainerRef"},
172 {"2#subtree#","#krbSearchScope"},
173 {"2#subtree#","#krbLdapServers"},
174 {"2#subtree#","#krbKdcServers"},
175 {"2#subtree#","#krbAdmServers"},
176 {"2#subtree#","#krbPwdServers"},
177 {"6#subtree#","#krbTicketFlags"},
178 {"6#subtree#","#krbMaxTicketLife"},
179 {"6#subtree#","#krbMaxRenewableAge"},
180 {"6#subtree#","#krbPrincipalName"},
181 {"6#subtree#","#krbPrincipalKey"},
182 {"6#subtree#","#krbPrincipalExpiration"},
183 {"6#subtree#","#krbPwdHistoryLength"},
184 {"6#subtree#","#krbMinPwdLife"},
185 {"6#subtree#","#krbMaxPwdLife"},
186 {"6#subtree#","#krbPwdMinDiffChars"},
187 {"6#subtree#","#krbPwdMinLength"},
188 {"6#subtree#","#krbPwdPolicyReference"},
189 {"6#subtree#","#krbLastPwdChange"},
190 {"6#subtree#","#krbObjectReferences"},
191 {"6#subtree#","#krbExtraData"},
192 {"6#subtree#","#krbPasswordExpiration"},
193 {"6#subtree#","#krbDefaultEncSaltTypes"},
194 {"2#subtree#","#krbLastFailedAuth"},
195 {"2#subtree#","#krbLoginFailedCount"},
196 {"2#subtree#","#krbLastSuccessfulAuth"},
197 {"6#subtree#","#krbPwdMaxFailure"},
198 {"6#subtree#","#krbPwdFailureCountInterval"},
199 {"6#subtree#","#krbPwdLockoutDuration"},
205 {"1#subtree#","#[Entry Rights]"},
206 {"2#subtree#","#CN"},
207 {"2#subtree#","#ObjectClass"},
208 {"2#subtree#","#krbTicketPolicyReference"},
209 {"2#subtree#","#krbMKey"},
210 {"2#subtree#","#krbUPEnabled"},
211 {"2#subtree#","#krbSubTrees"},
212 {"2#subtree#","#krbPrincContainerRef"},
213 {"2#subtree#","#krbSearchScope"},
214 {"2#subtree#","#krbLdapServers"},
215 {"2#subtree#","#krbKdcServers"},
216 {"2#subtree#","#krbAdmServers"},
217 {"2#subtree#","#krbPwdServers"},
218 {"6#subtree#","#krbTicketFlags"},
219 {"2#subtree#","#krbMaxTicketLife"},
220 {"2#subtree#","#krbMaxRenewableAge"},
221 {"2#subtree#","#krbPrincipalName"},
222 {"6#subtree#","#krbPrincipalKey"},
223 {"2#subtree#","#krbPrincipalExpiration"},
224 {"2#subtree#","#krbPwdHistoryLength"},
225 {"2#subtree#","#krbMinPwdLife"},
226 {"2#subtree#","#krbMaxPwdLife"},
227 {"2#subtree#","#krbPwdMinDiffChars"},
228 {"2#subtree#","#krbPwdMinLength"},
229 {"2#subtree#","#krbPwdPolicyReference"},
230 {"2#subtree#","#krbLastPwdChange"},
231 {"2#subtree#","#krbObjectReferences"},
232 {"6#subtree#","#krbExtraData"},
233 {"6#subtree#","#krbPasswordExpiration"},
234 {"2#subtree#","#krbDefaultEncSaltTypes"},
235 {"2#subtree#","#krbLastFailedAuth"},
236 {"2#subtree#","#krbLoginFailedCount"},
237 {"2#subtree#","#krbLastSuccessfulAuth"},
238 {"2#subtree#","#krbPwdMaxFailure"},
239 {"2#subtree#","#krbPwdFailureCountInterval"},
240 {"2#subtree#","#krbPwdLockoutDuration"},
245 {"1#subtree#","#[Entry Rights]"},
246 {"2#subtree#","#krbContainerReference"},
251 {"1#subtree#","#[Entry Rights]"},
252 {"2#subtree#","#krbTicketPolicyReference"},
259 * The function will read the subtree attribute from the specified
261 * container and the subtree. The kerberos context passed should
280 char *realmdn=NULL, **subtree=NULL;
304 subtree = (char **) malloc(sizeof(char *) * (subtreecount + 1));
305 if(subtree == NULL) {
309 memset(subtree, 0, sizeof(char *) * (subtreecount + 1));
312 subtree[i] = strdup(subtreeparam[i]);
313 if(subtree[i] == NULL) {
320 subtree[i] = strdup(contref);
449 if ((mask & LDAP_SUBTREE_RIGHTS) && (subtree != NULL)) {
450 /* Populate the acl data to be added to the subtree */
463 for(j=0; subtree[j]!=NULL && j<subtreecount;j++) {
465 subtree[j],
486 for(j=0; subtree[j]!=NULL && j<subtreecount;j++) {
488 subtree[j],
509 for(j=0; subtree[j]!=NULL && j<subtreecount;j++) {
511 subtree[j],
532 if (subtree)
533 free(subtree);
542 The function will read the subtree attribute from the specified
544 container and the subtree. The kerberos context passed should
564 char **subtree=NULL;
588 subtree = (char **) malloc(sizeof(char *) * (subtreecount + 1));
589 if(subtree == NULL) {
593 memset(subtree, 0, sizeof(char *) * (subtreecount + 1));
596 subtree[i] = strdup(subtreeparam[i]);
597 if(subtree[i] == NULL) {
604 subtree[i] = strdup(contref);
682 /* Set the rights for the subtree */
683 if ((mask & LDAP_SUBTREE_RIGHTS) && (subtree != NULL)) {
685 /* Populate the acl data to be added to the subtree */
697 for(j=0; subtree[j]!=NULL && j<subtreecount; j++) {
699 subtree[j],
719 for(j=0; subtree[j]!=NULL && j<subtreecount; j++) {
721 subtree[j],
741 for(j=0; subtree[j]!=NULL && j<subtreecount; j++) {
743 subtree[j],
765 if (subtree)
766 free(subtree);