/titanic_41/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | ldap_krbcontainer.c | 57 if (cparams->DN) in krb5_ldap_free_krbcontainer_params() 58 krb5_xfree(cparams->DN); in krb5_ldap_free_krbcontainer_params() 98 &cparams->DN)) != 0) { in krb5_ldap_read_krbcontainer_params() 106 if (cparams->DN == NULL) { in krb5_ldap_read_krbcontainer_params() 109 NULL, &cparams->DN)) != 0) { in krb5_ldap_read_krbcontainer_params() 121 if (cparams->DN == NULL) { in krb5_ldap_read_krbcontainer_params() 128 if (cparams->DN != NULL) { in krb5_ldap_read_krbcontainer_params() 132 …LDAP_SEARCH_1(cparams->DN, LDAP_SCOPE_BASE, "(objectclass=krbContainer)", policyrefattribute, IGNO… in krb5_ldap_read_krbcontainer_params() 150 if ((cparams->DN == NULL) || (st == LDAP_NO_SUCH_OBJECT)) { in krb5_ldap_read_krbcontainer_params() 158 &(cparams->DN), NULL)) != 0) in krb5_ldap_read_krbcontainer_params() [all …]
|
H A D | ldap_create.c | 279 &kparams.DN)) != 0) { in krb5_ldap_create() 283 if (kparams.DN == NULL) { in krb5_ldap_create() 287 NULL, &kparams.DN)) != 0) { in krb5_ldap_create() 294 ((kparams.DN != NULL) ? &kparams : NULL)); in krb5_ldap_create() 392 ((kparams.DN != NULL) ? &kparams : NULL)); in krb5_ldap_create() 398 if (kparams.DN != NULL) in krb5_ldap_create() 399 krb5_xfree(kparams.DN); in krb5_ldap_create()
|
H A D | ldap_principal.c | 262 char *user=NULL, *DN=NULL, *strval[10] = {NULL}; local 287 ((st=krb5_get_userdn(context, &entries, &(DN))) != 0)) 290 if (DN == NULL) { 299 st = ldap_delete_ext_s(ld, DN, NULL, NULL); 348 if ((st=checkattributevalue(ld, DN, "objectclass", attrvalues, &amask)) != 0) 362 st=ldap_modify_ext_s(ld, DN, mods, NULL, NULL); 373 if (DN) 374 free (DN);
|
H A D | ldap_service_rights.c | 315 || (ldap_context->krbcontainer->DN == NULL)) { 397 ldap_context->krbcontainer->DN, 414 strlen(ldap_context->krbcontainer->DN) + 2); 419 sprintf(realmdn,"cn=%s,%s", realmname, ldap_context->krbcontainer->DN); 661 || (ldap_context->krbcontainer->DN == NULL)) { 698 strlen(ldap_context->krbcontainer->DN) + 2); 703 sprintf(realmdn,"cn=%s,%s", realmname, ldap_context->krbcontainer->DN);
|
H A D | ldap_krbcontainer.h | 42 char *DN; member
|
H A D | ldap_realm.c | 193 LDAP_SEARCH(ldap_context->krbcontainer->DN, 802 if (krbcontparams != NULL && krbcontparams->DN != NULL) { 803 kerberoscontdn = krbcontparams->DN; 921 if (krbcontparams != NULL && krbcontparams->DN != NULL) { in krb5_ldap_delete_krbcontainer() 922 kerberoscontdn = krbcontparams->DN; in krb5_ldap_delete_krbcontainer() 978 ldap_context->krbcontainer->DN == NULL || 1005 dn = malloc(strlen("cn=") + strlen(realm_name) + strlen(ldap_context->krbcontainer->DN) + 2); 1008 sprintf(dn, "cn=%s,%s", realm_name, ldap_context->krbcontainer->DN); 1217 ldap_context->krbcontainer->DN == NULL) { 1251 krbcontDN = ldap_context->krbcontainer->DN;
|
H A D | ldap_misc.c | 700 char *DN=NULL, **DNarr=NULL; local 752 DN = malloc (sublen + 1); 753 if (DN == NULL) 755 memcpy(DN, curr, sublen); 756 DN[sublen] = 0; 757 *data = DN; 1978 char *DN = NULL; in populate_krb5_db_entry() local 2004 if ((DN = ldap_get_dn(ld, ent)) == NULL) { in populate_krb5_db_entry() 2024 ((st=store_tl_data(&userinfo_tl_data, KDB_TL_USERDN, DN)) != 0)) in populate_krb5_db_entry() 2245 if (DN != NULL) in populate_krb5_db_entry() [all …]
|
/titanic_41/usr/src/lib/libast/common/features/ |
H A D | tvlib | 46 tst - -DN=1 - -DN=2 - -DN=3 - -DN=4 output{
|
H A D | common | 144 tst - -DN=1 - -DN=2 - -DN=3 - -DN=4 - -DN=5 - -DN=6 - -DN=7 - -DN=8 - -DN=0 output{ 276 tst - -DN=1 - -DN=0 output{
|
H A D | float | 935 tst - -DN=1 - -DN=2 note{ _ast_fltmax_t maximum integral type }end output{
|
/titanic_41/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AuthBlock.java | 378 String DN = cert.getSubjectDN().toString(); in getSignAs() local 382 e_DN = ServiceLocationAttribute.escapeAttributeString(DN, false); in getSignAs() 385 e_DN = DN; in getSignAs() 387 DN = e_DN; in getSignAs() 401 answer.put(DN, new Integer(ibsd)); in getSignAs() 1020 static private X509Certificate getCert(String DN, KeyStore ks) 1027 DN = ServiceLocationAttribute.unescapeAttributeString(DN, false); 1032 new Object[] {DN, e.getMessage()}); 1036 cert = (X509Certificate)ks.getCertificate(DN); 1046 new Object[] {DN, e.getMessage()}); [all …]
|
/titanic_41/usr/src/lib/libslp/clib/ |
H A D | libslp.po | 155 msgid "Can not get my DN: %s" 159 msgid "Can not convert DN to string: %s" 165 msgid "can not create DN structure for %s: %s" 167 msgid "can not convert DN to string: %s"
|
/titanic_41/usr/src/cmd/fm/dicts/ |
H A D | GMCA.po | 203 # code: GMCA-8000-DN 206 msgid "GMCA-8000-DN.type" 208 msgid "GMCA-8000-DN.severity" 210 msgid "GMCA-8000-DN.description" 212 msgid "GMCA-8000-DN.response" 214 msgid "GMCA-8000-DN.impact" 216 msgid "GMCA-8000-DN.action"
|
/titanic_41/usr/src/cmd/krb5/ldap_util/ |
H A D | kdb5_ldap_realm.c | 558 &kparams.DN)) != 0) { 562 if (kparams.DN == NULL) { 566 NULL, &kparams.DN)) != 0) { 572 if (kparams.DN == NULL) { 588 kparams.DN = NULL; 590 kparams.DN = krb_location; 592 kparams.DN = NULL; 597 ((kparams.DN != NULL) ? &kparams : NULL));
|
H A D | kdb5_ldap_services.c | 314 ldap_context->krbcontainer->DN))) { 753 ldap_context->krbcontainer->DN))) { 802 ldap_context->krbcontainer->DN))) { 832 ldap_context->krbcontainer->DN))) {
|
/titanic_41/usr/src/lib/libsldap/common/ |
H A D | ns_common.c | 383 char *** DN, in __s_api_getDNs() argument 501 *DN = dns; in __s_api_getDNs() 516 char *** DN, in __s_api_get_search_DNs_v1() argument 541 *DN = dns; in __s_api_get_search_DNs_v1()
|
/titanic_41/usr/src/cmd/idmap/idmapd/ |
H A D | nldaputils.c | 93 #define DN "dn" macro 656 val = __ns_ldap_getAttr(entry, DN); in idmap_nldap_lookup_batch_end()
|
/titanic_41/usr/src/cmd/troff/ |
H A D | tdef.h | 435 #define DN 5 macro
|
H A D | n3.c | 877 numtab[DN].val = dip->dnl; in casedi()
|
/titanic_41/usr/src/cmd/ypcmd/yp2lscripts/ |
H A D | inityp2l.sh | 215 HELP - The DN which stores the configuration information in LDAP. 258 HELP - The bind DN of the proxy user used to obtain configuration 291 HELP - The bind DN of the proxy user the ypserv to read or write
|
/titanic_41/usr/src/data/hwdata/ |
H A D | usb.ids | 5430 0023 HL-5170DN series 5437 002b HL-5250DN Printer 5441 0041 HL-2250DN Laser Printer 5557 01a4 DCP-8065DN Printer 5559 01a6 MFC-8860DN Port(FaxModem) 5576 01bd MFC-8660DN 5618 020a MFC-8670DN 5621 0216 MFC-8880DN 5622 0217 MFC-8480DN 5623 0219 MFC-8380DN [all …]
|
/titanic_41/usr/src/cmd/ldap/ns_ldap/ |
H A D | idsconfig.sh | 131 2 Base DN to setup : $LDAP_BASEDN$SUFFIX_INFO$DB_INFO 155 Sorry, suffix ${LDAP_SUFFIX} is not suitable for Base DN ${LDAP_BASEDN}
|
/titanic_41/usr/src/cmd/sendmail/cf/ |
H A D | README | 2041 Note that neither includes the LDAP server hostname (-h server) or base DN 2744 DN (CN) is the distinguished (common) name of a cert, and CA is a 2764 ${cert_issuer} holds the DN of the CA (the cert issuer). 2765 ${cert_subject} holds the DN of the cert (called the cert subject). 2796 Otherwise the DN of the issuer is looked up in the access map using the 2798 If it is SUBJECT, the DN of the cert subject is looked up next in the 2850 - if OpenSSL 0.9.7 or newer is used then the "Email=" part of a DN
|
/titanic_41/usr/src/cmd/sendmail/cf/m4/ |
H A D | proto.m4 | 2824 dnl @ could be part of a CN, DN, etc... 2825 dnl use < > ? those are encoded in CN, DN, ...
|
/titanic_41/usr/src/lib/libast/common/ |
H A D | RELEASE | 164 07-10-31 port/astmath.c: add -DN=8 for signbit()
|