Lines Matching refs:server
242 if ((krb5_princ_realm(kdc_context, apreq->ticket->server)->length != in kdc_process_tgs_req()
244 memcmp(krb5_princ_realm(kdc_context, apreq->ticket->server)->data, in kdc_process_tgs_req()
278 apreq->ticket->server, in kdc_process_tgs_req()
298 apreq, apreq->ticket->server, in kdc_process_tgs_req()
389 krb5_db_entry server; in kdc_get_server_key() local
396 if ((retval = krb5_db_get_principal(kdc_context, ticket->server, in kdc_get_server_key()
397 &server, &nprincs, in kdc_get_server_key()
402 krb5_db_free_principal(kdc_context, &server, nprincs); in kdc_get_server_key()
407 krb5_db_free_principal(kdc_context, &server, nprincs); in kdc_get_server_key()
408 if (!krb5_unparse_name(kdc_context, ticket->server, &sname)) { in kdc_get_server_key()
416 retval = krb5_dbe_find_enctype(kdc_context, &server, in kdc_get_server_key()
433 krb5_db_free_principal(kdc_context, &server, nprincs); in kdc_get_server_key()
569 krb5_principal server) in add_to_transited() argument
641 (krb5_princ_realm(kdc_context, server)->length == strlen(realm) && in add_to_transited()
642 !strncmp(krb5_princ_realm(kdc_context, server)->data, realm, strlen(realm))); in add_to_transited()
850 krb5_db_entry server, krb5_timestamp kdc_time, in validate_as_request() argument
866 !isflagset(server.attributes, KRB5_KDB_PWCHANGE_SERVICE)) { in validate_as_request()
886 if (server.expiration && server.expiration < kdc_time) { in validate_as_request()
896 !isflagset(server.attributes, KRB5_KDB_PWCHANGE_SERVICE)) { in validate_as_request()
905 isflagset(server.attributes, KRB5_KDB_DISALLOW_POSTDATED))) { in validate_as_request()
913 isflagset(server.attributes, KRB5_KDB_DISALLOW_FORWARDABLE))) { in validate_as_request()
921 isflagset(server.attributes, KRB5_KDB_DISALLOW_RENEWABLE))) { in validate_as_request()
929 isflagset(server.attributes, KRB5_KDB_DISALLOW_PROXIABLE))) { in validate_as_request()
941 if (isflagset(server.attributes, KRB5_KDB_DISALLOW_ALL_TIX)) { in validate_as_request()
947 if (isflagset(server.attributes, KRB5_KDB_DISALLOW_SVR)) { in validate_as_request()
955 errcode = against_local_policy_as(request, server, client, in validate_as_request()
1123 validate_tgs_request(register krb5_kdc_req *request, krb5_db_entry server, in validate_tgs_request() argument
1136 if (server.expiration && server.expiration < kdc_time) { in validate_tgs_request()
1147 if (!krb5_principal_compare(kdc_context, ticket->server, request->server)) { in validate_tgs_request()
1167 if (krb5_princ_size(kdc_context, ticket->server) != 2) { in validate_tgs_request()
1172 if (!krb5_is_tgs_principal(ticket->server)) { in validate_tgs_request()
1177 if ((krb5_princ_size(kdc_context, ticket->server) <= 1) || in validate_tgs_request()
1178 (krb5_princ_component(kdc_context, ticket->server, 1)->length != in validate_tgs_request()
1179 krb5_princ_realm(kdc_context, request->server)->length) || in validate_tgs_request()
1180 memcmp(krb5_princ_component(kdc_context, ticket->server, 1)->data, in validate_tgs_request()
1181 krb5_princ_realm(kdc_context, request->server)->data, in validate_tgs_request()
1182 krb5_princ_realm(kdc_context, request->server)->length)) { in validate_tgs_request()
1191 if (isflagset(server.attributes, KRB5_KDB_DISALLOW_TGT_BASED)) { in validate_tgs_request()
1239 (!request->server->data || in validate_tgs_request()
1240 request->server->data[0].length != KRB5_TGS_NAME_SIZE || in validate_tgs_request()
1241 memcmp(request->server->data[0].data, KRB5_TGS_NAME, in validate_tgs_request()
1249 isflagset(server.attributes, KRB5_KDB_DISALLOW_FORWARDABLE)) { in validate_tgs_request()
1256 isflagset(server.attributes, KRB5_KDB_DISALLOW_RENEWABLE)) { in validate_tgs_request()
1263 isflagset(server.attributes, KRB5_KDB_DISALLOW_PROXIABLE)) { in validate_tgs_request()
1270 isflagset(server.attributes, KRB5_KDB_DISALLOW_POSTDATED)) { in validate_tgs_request()
1277 isflagset(server.attributes, KRB5_KDB_DISALLOW_DUP_SKEY)) { in validate_tgs_request()
1283 if (isflagset(server.attributes, KRB5_KDB_DISALLOW_ALL_TIX)) { in validate_tgs_request()
1289 if (isflagset(server.attributes, KRB5_KDB_DISALLOW_SVR)) { in validate_tgs_request()
1330 if (!krb5_principal_compare(kdc_context, request->second_ticket[st_idx]->server, in validate_tgs_request()
1339 if (isflagset(server.attributes, KRB5_KDB_REQUIRES_HW_AUTH) && in validate_tgs_request()
1346 if (isflagset(server.attributes, KRB5_KDB_REQUIRES_PRE_AUTH) && in validate_tgs_request()
1355 errcode = against_local_policy_tgs(request, server, ticket, status); in validate_tgs_request()
1431 select_session_keytype(krb5_context context, krb5_db_entry *server, in select_session_keytype() argument
1443 if (dbentry_supports_enctype(context, server, ktype[i])) in select_session_keytype()