Lines Matching refs:fqdn
109 smb_krb5_get_pn_set(smb_krb5_pn_set_t *set, uint32_t type, char *fqdn)
114 if (!set || !fqdn)
134 type, fqdn);
195 smb_krb5_kt_update_startup(char *fqdn, krb5_kvno kvno, uint32_t kt_flags)
220 if (smb_krb5_get_pn_set(&spns, SMB_PN_KEYTAB_ENTRY, fqdn)
227 if ((kerr = smb_krb5_kt_spn_validate(ctx, fqdn, kt_flags,
251 fqdn, kvno, kt_flags, pwd)) != 0) {
276 * Pre-condition: fqdn and passwd input parameters have already been validated
280 smb_krb5_kt_update_adjoin(char *fqdn, krb5_kvno kvno, char *passwd,
296 if (smb_krb5_kt_remove_by_fqdn(ctx, fqdn) != 0) {
304 if (smb_krb5_get_pn_set(&spns, keytype, fqdn) == 0) {
310 fqdn, kvno, kt_flags, passwd)) != 0) {
314 path, fqdn);
328 smb_krb5_kt_remove(char *fqdn)
340 if (smb_krb5_kt_remove_by_fqdn(ctx, fqdn) != 0)
352 smb_krb5_setpwd(const char *fqdn, char *passwd)
369 SMB_PN_UPN_ATTR, fqdn, &princ) != 0) {
412 * Derives the Kerberos realm from the specified fqdn, and removes
416 smb_krb5_kt_remove_by_fqdn(krb5_context ctx, char *fqdn)
421 if ((fqdn == NULL) || (*fqdn == '\0'))
424 if ((realm = smb_krb5_domain2realm(fqdn)) == NULL)
437 path, fqdn);
451 smb_krb5_kt_spn_validate(krb5_context ctx, const char *fqdn, uint32_t flags,
474 SMB_PN_KEYTAB_ENTRY, fqdn);
505 smb_krb5_kt_find(smb_krb5_pn_id_t id, const char *fqdn, char *fname)
515 if (!fqdn || !fname)
524 if (smb_krb5_get_kprinc(ctx, id, SMB_PN_KEYTAB_ENTRY, fqdn,
565 const char *fqdn, krb5_principal *princ)
569 if ((buf = smb_krb5_get_pn_by_id(id, type, fqdn)) == NULL)