Searched refs:DN (Results 1 - 16 of 16) sorted by relevance

/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_krbcontainer.c57 if (cparams->DN)
58 krb5_xfree(cparams->DN);
98 &cparams->DN)) != 0) {
106 if (cparams->DN == NULL) {
109 NULL, &cparams->DN)) != 0) {
121 if (cparams->DN == NULL) {
128 if (cparams->DN != NULL) {
132 LDAP_SEARCH_1(cparams->DN, LDAP_SCOPE_BASE, "(objectclass=krbContainer)", policyrefattribute, IGNORE_STATUS);
150 if ((cparams->DN == NULL) || (st == LDAP_NO_SUCH_OBJECT)) {
158 &(cparams->DN), NUL
[all...]
H A Dldap_krbcontainer.h42 char *DN; member in struct:_krb5_ldap_krbcontainer_params
H A Dldap_create.c279 &kparams.DN)) != 0) {
283 if (kparams.DN == NULL) {
287 NULL, &kparams.DN)) != 0) {
294 ((kparams.DN != NULL) ? &kparams : NULL));
392 ((kparams.DN != NULL) ? &kparams : NULL));
398 if (kparams.DN != NULL)
399 krb5_xfree(kparams.DN);
H A Dldap_principal.c262 char *user=NULL, *DN=NULL, *strval[10] = {NULL}; local
287 ((st=krb5_get_userdn(context, &entries, &(DN))) != 0))
290 if (DN == NULL) {
292 krb5_set_error_message(context, st, gettext("DN information missing"));
299 st = ldap_delete_ext_s(ld, DN, NULL, NULL);
348 if ((st=checkattributevalue(ld, DN, "objectclass", attrvalues, &amask)) != 0)
362 st=ldap_modify_ext_s(ld, DN, mods, NULL, NULL);
373 if (DN)
374 free (DN);
H A Dldap_service_rights.c315 || (ldap_context->krbcontainer->DN == NULL)) {
397 ldap_context->krbcontainer->DN,
414 strlen(ldap_context->krbcontainer->DN) + 2);
419 sprintf(realmdn,"cn=%s,%s", realmname, ldap_context->krbcontainer->DN);
661 || (ldap_context->krbcontainer->DN == NULL)) {
698 strlen(ldap_context->krbcontainer->DN) + 2);
703 sprintf(realmdn,"cn=%s,%s", realmname, ldap_context->krbcontainer->DN);
H A Dldap_realm.c181 /* get the kerberos container DN information */
193 LDAP_SEARCH(ldap_context->krbcontainer->DN,
802 if (krbcontparams != NULL && krbcontparams->DN != NULL) {
803 kerberoscontdn = krbcontparams->DN;
823 krb5_set_error_message(context, st, gettext("Invalid Kerberos container DN"));
921 if (krbcontparams != NULL && krbcontparams->DN != NULL) {
922 kerberoscontdn = krbcontparams->DN;
978 ldap_context->krbcontainer->DN == NULL ||
1005 dn = malloc(strlen("cn=") + strlen(realm_name) + strlen(ldap_context->krbcontainer->DN) + 2);
1008 sprintf(dn, "cn=%s,%s", realm_name, ldap_context->krbcontainer->DN);
[all...]
H A Dldap_misc.c700 char *DN=NULL, **DNarr=NULL; local
752 DN = malloc (sublen + 1);
753 if (DN == NULL)
755 memcpy(DN, curr, sublen);
756 DN[sublen] = 0;
757 *data = DN;
1816 /* 1 = return DN components without type prefix */
1978 char *DN = NULL; local
2004 if ((DN = ldap_get_dn(ld, ent)) == NULL) {
2022 /* add principalcount, DN an
[all...]
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/
H A DAuthBlock.java313 // Get cert for input DN
338 // Get cert for input DN
377 /* derive DN from alias */
378 String DN = cert.getSubjectDN().toString();
380 // escape DN
382 e_DN = ServiceLocationAttribute.escapeAttributeString(DN, false);
385 e_DN = DN;
387 DN = e_DN;
401 answer.put(DN, new Integer(ibsd));
1018 * by DN
1020 getCert(String DN, KeyStore ks) argument
[all...]
/illumos-gate/usr/src/cmd/krb5/ldap_util/
H A Dkdb5_ldap_realm.c547 /* Prompt the user for entering the DN of Kerberos container */
558 &kparams.DN)) != 0) {
562 if (kparams.DN == NULL) {
566 NULL, &kparams.DN)) != 0) {
572 if (kparams.DN == NULL) {
574 printf(gettext("Enter DN of Kerberos container [cn=Kerberos,cn=Security]: "));
576 printf(gettext("Enter DN of Kerberos container: "));
588 kparams.DN = NULL;
590 kparams.DN = krb_location;
592 kparams.DN
[all...]
H A Dkdb5_ldap_services.c161 * Given a realm name, this function will convert it to a DN by appending the
256 /* Read Kerberos container info, to construct realm DN from name
314 ldap_context->krbcontainer->DN))) {
350 } else { /* Any other argument must be service DN */
351 /* First check if service DN is already provided --
359 /* If not present already, fill up service DN */
368 /* No point in proceeding further if service DN value is not available */
392 /* Set service DN as the last argument */
540 /* Parse all arguments, only to pick up service DN (Pass 1) */
556 } else { /* Any other argument must be service DN */
[all...]
/illumos-gate/usr/src/lib/libsldap/common/
H A Dns_common.c378 * OUTPUT: DN, error
383 char *** DN,
501 *DN = dns;
512 * OUTPUT: DN, error
516 char *** DN,
541 *DN = dns;
1920 * Prepend automountMapName=auto_xxx to the DN
2228 * format, this function makes no such assumption. If the DN
382 __s_api_getDNs( char *** DN, const char *service, ns_ldap_error_t ** error) argument
515 __s_api_get_search_DNs_v1( char *** DN, const char *service, ns_ldap_error_t ** error) argument
/illumos-gate/usr/src/cmd/troff/
H A Dtdef.h435 #define DN 5 macro
H A Dn3.c877 numtab[DN].val = dip->dnl;
/illumos-gate/usr/src/cmd/idmap/idmapd/
H A Dnldaputils.c93 #define DN "dn" macro
654 /* Get DN for how info */
656 val = __ns_ldap_getAttr(entry, DN);
/illumos-gate/usr/src/cmd/ypcmd/yp2lscripts/
H A Dinityp2l.sh215 HELP - The DN which stores the configuration information in LDAP.
258 HELP - The bind DN of the proxy user used to obtain configuration
291 HELP - The bind DN of the proxy user the ypserv to read or write
1562 get_ans "DN for configuration information (h=help):"
1579 # DN is set. So, if a value is specified, set a flag.
1661 get_ans_req "Proxy user bind DN to obtain configuration information (h=help):"
1761 get_ans_req "Proxy user bind DN to read/write data from/to LDAP (h=help):"
2096 # Ask proxy user bind DN only if needed.
2162 # Ask proxy user bind DN only if needed.
3952 # Associate maps with RDNs and object classes. Base DN come
[all...]
/illumos-gate/usr/src/cmd/ldap/ns_ldap/
H A Didsconfig.sh131 2 Base DN to setup : $LDAP_BASEDN$SUFFIX_INFO$DB_INFO
155 Sorry, suffix ${LDAP_SUFFIX} is not suitable for Base DN ${LDAP_BASEDN}
201 No valid suffixes (naming contexts) were found for LDAP base DN:
217 HELP - Our Base DN is ${LDAP_BASEDN}
219 which can be equal to Base DN itself or be any of Base DN parents.
302 at the base DN for the given service, or "sub", which would specify
303 the search will be performed through *all* levels below the base DN
313 is configured, you will also be prompted to enter a bind DN
428 used to override the default search base DN, th
[all...]

Completed in 84 milliseconds