config 132 lib/zlib/deflate.c local const config configuration_table[2] = {
config 137 lib/zlib/deflate.c local const config configuration_table[10] = {
config 1706 librpc/gen_ndr/cli_ntsvcs.c r.in.config = config;
config 2110 librpc/gen_ndr/ndr_ntsvcs.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, r->in.config));
config 2174 librpc/gen_ndr/ndr_ntsvcs.c NDR_CHECK(ndr_pull_uint32(ndr, NDR_SCALARS, &r->in.config));
config 2286 librpc/gen_ndr/ndr_ntsvcs.c ndr_print_uint32(ndr, "config", r->in.config);
config 389 librpc/gen_ndr/ntsvcs.h uint32_t config;
config 85 source3/include/ads.h } config;
config 175 source3/libads/ads_struct.c SAFE_FREE((*ads)->config.realm);
config 176 source3/libads/ads_struct.c SAFE_FREE((*ads)->config.bind_path);
config 177 source3/libads/ads_struct.c SAFE_FREE((*ads)->config.ldap_server_name);
config 178 source3/libads/ads_struct.c SAFE_FREE((*ads)->config.server_site_name);
config 179 source3/libads/ads_struct.c SAFE_FREE((*ads)->config.client_site_name);
config 180 source3/libads/ads_struct.c SAFE_FREE((*ads)->config.schema_path);
config 181 source3/libads/ads_struct.c SAFE_FREE((*ads)->config.config_path);
config 95 source3/libads/disp_sec.c ret = ads_get_attrname_by_guid(ads, ads->config.schema_path,
config 101 source3/libads/disp_sec.c ret = ads_get_extended_right_name_by_guid(ads, ads->config.config_path,
config 199 source3/libads/disp_sec.c if (ads && !ads->config.schema_path) {
config 201 source3/libads/disp_sec.c ads->config.schema_path = SMB_STRDUP(tmp_path);
config 205 source3/libads/disp_sec.c if (ads && !ads->config.config_path) {
config 207 source3/libads/disp_sec.c ads->config.config_path = SMB_STRDUP(tmp_path);
config 828 source3/libads/krb5_setpw.c if (asprintf(&principal, "%s@%s", machine_account, ads->config.realm) < 0) {
config 140 source3/libads/ldap.c if (ads->config.server_site_name == NULL &&
config 141 source3/libads/ldap.c ads->config.client_site_name == NULL ) {
config 145 source3/libads/ldap.c if (ads->config.server_site_name &&
config 146 source3/libads/ldap.c ads->config.client_site_name &&
config 147 source3/libads/ldap.c strequal(ads->config.server_site_name,
config 148 source3/libads/ldap.c ads->config.client_site_name)) {
config 149 source3/libads/ldap.c DEBUG(10,("ads_sitename_match: name %s match\n", ads->config.server_site_name));
config 153 source3/libads/ldap.c ads->config.server_site_name ? ads->config.server_site_name : "NULL",
config 154 source3/libads/ldap.c ads->config.client_site_name ? ads->config.client_site_name : "NULL"));
config 164 source3/libads/ldap.c if (ads->config.flags & NBT_SERVER_CLOSEST) {
config 175 source3/libads/ldap.c if (ads->config.client_site_name == NULL) {
config 181 source3/libads/ldap.c ads->config.ldap_server_name));
config 234 source3/libads/ldap.c SAFE_FREE(ads->config.realm);
config 235 source3/libads/ldap.c SAFE_FREE(ads->config.bind_path);
config 236 source3/libads/ldap.c SAFE_FREE(ads->config.ldap_server_name);
config 237 source3/libads/ldap.c SAFE_FREE(ads->config.server_site_name);
config 238 source3/libads/ldap.c SAFE_FREE(ads->config.client_site_name);
config 241 source3/libads/ldap.c ads->config.flags = cldap_reply.server_type;
config 242 source3/libads/ldap.c ads->config.ldap_server_name = SMB_STRDUP(cldap_reply.pdc_dns_name);
config 243 source3/libads/ldap.c ads->config.realm = SMB_STRDUP(cldap_reply.dns_domain);
config 244 source3/libads/ldap.c strupper_m(ads->config.realm);
config 245 source3/libads/ldap.c ads->config.bind_path = ads_build_dn(ads->config.realm);
config 247 source3/libads/ldap.c ads->config.server_site_name =
config 251 source3/libads/ldap.c ads->config.client_site_name =
config 547 source3/libads/ldap.c SAFE_FREE(ads->config.bind_path);
config 548 source3/libads/ldap.c ads->config.bind_path = SMB_STRDUP("");
config 634 source3/libads/ldap.c ads->auth.realm = SMB_STRDUP(ads->config.realm);
config 647 source3/libads/ldap.c if (asprintf(&env, "KRB5_KDC_ADDRESS_%s", ads->config.realm) > 0) {
config 669 source3/libads/ldap.c ads->ldap.ld = ldap_open_with_timeout(ads->config.ldap_server_name,
config 675 source3/libads/ldap.c DEBUG(3,("Connected to LDAP server %s\n", ads->config.ldap_server_name));
config 679 source3/libads/ldap.c saf_store( ads->server.workgroup, ads->config.ldap_server_name);
config 680 source3/libads/ldap.c saf_store( ads->server.realm, ads->config.ldap_server_name);
config 1249 source3/libads/ldap.c return ads_do_search(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE,
config 1626 source3/libads/ldap.c if (asprintf(&base, "<WKGUID=%s,%s>", wknguid, ads->config.bind_path ) == -1) {
config 1652 source3/libads/ldap.c bind_dn_exp = ldap_explode_dn(ads->config.bind_path, 0);
config 1886 source3/libads/ldap.c spn, machine_name, ads->config.realm));
config 2845 source3/libads/ldap.c ads->config.current_time = ads_parse_time(timestr);
config 2847 source3/libads/ldap.c if (ads->config.current_time != 0) {
config 2848 source3/libads/ldap.c ads->auth.time_offset = ads->config.current_time - time(NULL);
config 2933 source3/libads/ldap.c rc = ads_do_search_retry(ads, ads->config.bind_path, LDAP_SCOPE_BASE, "(objectclass=*)",
config 3006 source3/libads/ldap.c if (strequal(computer_name, ads->config.ldap_server_name)) {
config 3712 source3/libads/ldap.c status = ads_do_search_all(ads, ads->config.bind_path,
config 3873 source3/libads/ldap.c ads->config.bind_path);
config 67 source3/libads/ldap_user.c if (!(upn = talloc_asprintf(ctx, "%s@%s", user, ads->config.realm)))
config 72 source3/libads/ldap_user.c ads->config.bind_path)))
config 112 source3/libads/ldap_user.c ads->config.bind_path)))
config 76 source3/libads/ldap_utils.c ads->config.realm, ads_errstr(status)));
config 135 source3/libads/ldap_utils.c return ads_do_search_retry(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE,
config 71 source3/libads/ndr.c ndr_print_netr_DsR_DcFlags(ndr, "flags", r->config.flags);
config 72 source3/libads/ndr.c ndr_print_string(ndr, "realm", r->config.realm);
config 73 source3/libads/ndr.c ndr_print_string(ndr, "bind_path", r->config.bind_path);
config 74 source3/libads/ndr.c ndr_print_string(ndr, "ldap_server_name", r->config.ldap_server_name);
config 75 source3/libads/ndr.c ndr_print_string(ndr, "server_site_name", r->config.server_site_name);
config 76 source3/libads/ndr.c ndr_print_string(ndr, "client_site_name", r->config.client_site_name);
config 77 source3/libads/ndr.c ndr_print_time_t(ndr, "current_time", r->config.current_time);
config 78 source3/libads/ndr.c ndr_print_string(ndr, "schema_path", r->config.schema_path);
config 79 source3/libads/ndr.c ndr_print_string(ndr, "config_path", r->config.config_path);
config 86 source3/libads/util.c } else if (ads->config.realm && ads->config.ldap_server_name) {
config 89 source3/libads/util.c server = SMB_STRDUP(ads->config.ldap_server_name);
config 90 source3/libads/util.c server_realm = SMB_STRDUP(ads->config.realm);
config 509 source3/libgpo/gpo_ldap.c status = ads_do_search_all_sd_flags(ads, ads->config.bind_path,
config 739 source3/libgpo/gpo_ldap.c ads->config.ldap_server_name,
config 775 source3/libgpo/gpo_ldap.c (!strequal(parent_dn, ads_parent_dn(ads->config.bind_path)))) {
config 820 source3/libgpo/gpo_ldap.c (!strequal(parent_dn, ads_parent_dn(ads->config.bind_path)))) {
config 661 source3/libgpo/gpo_util.c ads->config.ldap_server_name,
config 160 source3/libnet/libnet_join.c r->in.ads->config.realm);
config 65 source3/libnet/libnet_samsync_keytab.c ctx->dns_domain_name = talloc_strdup_upper(mem_ctx, ads->config.realm);
config 81 source3/libsmb/namequery_dc.c if (!ads->config.realm) {
config 102 source3/libsmb/namequery_dc.c if (is_our_primary_domain(domain) && (ads->config.flags & NBT_SERVER_KDC)) {
config 132 source3/libsmb/namequery_dc.c fstrcpy(srv_name, ads->config.ldap_server_name);
config 650 source3/rpc_server/srv_svcctl_nt.c config->displayname = regval_sz(val);
config 652 source3/rpc_server/srv_svcctl_nt.c config->displayname = name;
config 655 source3/rpc_server/srv_svcctl_nt.c config->startname = regval_sz(val);
config 659 source3/rpc_server/srv_svcctl_nt.c config->executablepath = regval_sz(val);
config 665 source3/rpc_server/srv_svcctl_nt.c config->tag_id = 0x00000000; /* unassigned loadorder group */
config 666 source3/rpc_server/srv_svcctl_nt.c config->service_type = SERVICE_TYPE_WIN32_OWN_PROCESS;
config 667 source3/rpc_server/srv_svcctl_nt.c config->error_control = SVCCTL_SVC_ERROR_NORMAL;
config 674 source3/rpc_server/srv_svcctl_nt.c config->start_type = SVCCTL_DISABLED;
config 676 source3/rpc_server/srv_svcctl_nt.c config->start_type = SVCCTL_DISABLED;
config 678 source3/rpc_server/srv_svcctl_nt.c config->start_type = SVCCTL_DEMAND_START;
config 141 source3/utils/net_ads.c if (!ads->config.realm) {
config 142 source3/utils/net_ads.c ads->config.realm = CONST_DISCARD(char *, c->opt_target_workgroup);
config 171 source3/utils/net_ads.c if (!ads || !ads->config.realm) {
config 187 source3/utils/net_ads.c d_printf("LDAP server name: %s\n", ads->config.ldap_server_name);
config 188 source3/utils/net_ads.c d_printf("Realm: %s\n", ads->config.realm);
config 189 source3/utils/net_ads.c d_printf("Bind Path: %s\n", ads->config.bind_path);
config 192 source3/utils/net_ads.c http_timestring(talloc_tos(), ads->config.current_time));
config 384 source3/utils/net_ads.c if (!ads->config.realm) {
config 385 source3/utils/net_ads.c ads->config.realm = CONST_DISCARD(char *, c->opt_target_workgroup);
config 488 source3/utils/net_ads.c if (asprintf(&upn, "%s@%s", argv[0], ads->config.realm) == -1) {
config 668 source3/utils/net_ads.c rc = ads_do_search_all_fn(ads, ads->config.bind_path,
config 818 source3/utils/net_ads.c rc = ads_do_search_all_fn(ads, ads->config.bind_path,
config 1108 source3/utils/net_ads.c "realm\n", ads->config.realm));
config 1862 source3/utils/net_ads.c if (!ads->config.realm) {
config 1921 source3/utils/net_ads.c if (asprintf(&host_principal, "%s$@%s", my_name, ads->config.realm) == -1) {
config 1990 source3/utils/net_ads.c rc = ads_do_search_all(ads, ads->config.bind_path,
config 239 source3/utils/net_ads_gpo.c status = ads_do_search_all_sd_flags(ads, ads->config.bind_path,
config 316 source3/utils/net_rpc_service.c struct QUERY_SERVICE_CONFIG config;
config 317 source3/utils/net_rpc_service.c uint32_t buf_size = sizeof(config);
config 369 source3/utils/net_rpc_service.c &config,
config 377 source3/utils/net_rpc_service.c &config,
config 392 source3/utils/net_rpc_service.c d_printf("\tService Type = 0x%x\n", config.service_type);
config 393 source3/utils/net_rpc_service.c d_printf("\tStart Type = 0x%x\n", config.start_type);
config 394 source3/utils/net_rpc_service.c d_printf("\tError Control = 0x%x\n", config.error_control);
config 395 source3/utils/net_rpc_service.c d_printf("\tTag ID = 0x%x\n", config.tag_id);
config 397 source3/utils/net_rpc_service.c if (config.executablepath) {
config 398 source3/utils/net_rpc_service.c d_printf("\tExecutable Path = %s\n", config.executablepath);
config 401 source3/utils/net_rpc_service.c if (config.loadordergroup) {
config 402 source3/utils/net_rpc_service.c d_printf("\tLoad Order Group = %s\n", config.loadordergroup);
config 405 source3/utils/net_rpc_service.c if (config.dependencies) {
config 406 source3/utils/net_rpc_service.c d_printf("\tDependencies = %s\n", config.dependencies);
config 409 source3/utils/net_rpc_service.c if (config.startname) {
config 410 source3/utils/net_rpc_service.c d_printf("\tStart Name = %s\n", config.startname);
config 413 source3/utils/net_rpc_service.c if (config.displayname) {
config 414 source3/utils/net_rpc_service.c d_printf("\tDisplay Name = %s\n", config.displayname);
config 88 source3/winbindd/idmap_ad.c if ( ads->config.realm && (expire > time(NULL))) {
config 126 source3/winbindd/idmap_adex/gc_util.c ads->config.ldap_server_name,
config 127 source3/winbindd/idmap_adex/gc_util.c ads->config.realm,
config 95 source3/winbindd/nss_info.c if ( !config )
config 98 source3/winbindd/nss_info.c p = strchr( config, ':' );
config 103 source3/winbindd/nss_info.c *backend = SMB_STRDUP( config );
config 113 source3/winbindd/nss_info.c len = PTR_DIFF(p,config)+1;
config 119 source3/winbindd/nss_info.c StrnCpy( q, config, len-1);
config 60 source3/winbindd/winbindd_ads.c if ( ads->config.realm && (expire > now)) {
config 125 source3/winbindd/winbindd_ads.c if (!ADS_ERR_OK(status) || !ads->config.realm) {
config 1032 source3/winbindd/winbindd_ads.c rc = ads_ranged_search(ads, tmp_ctx, LDAP_SCOPE_SUBTREE, ads->config.bind_path,
config 1106 source3/winbindd/winbindd_cm.c fstrcpy(name, ads->config.ldap_server_name);
config 1109 source3/winbindd/winbindd_cm.c DEBUG(10,("dcip_to_name: flags = 0x%x\n", (unsigned int)ads->config.flags));
config 1111 source3/winbindd/winbindd_cm.c if (domain->primary && (ads->config.flags & NBT_SERVER_KDC)) {
config 1113 source3/winbindd/winbindd_cm.c char *sitename = sitename_fetch(ads->config.realm);
config 59 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "_krb5_principalname2krb5_principal: %s",
config 66 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "krb5_unparse_name: %s",
config 70 source4/heimdal/kdc/524.c ret = _kdc_db_fetch(context, config, sprinc, HDB_F_GET_SERVER,
config 74 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 98 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "_krb5_principalname2krb5_principal: %s",
config 105 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "krb5_unparse_name: %s",
config 109 source4/heimdal/kdc/524.c kdc_log(context, config, 1, "524-REQ %s from %s for %s", cpn, from, spn);
config 122 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "Ticket expired (%s)", spn);
config 126 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "Ticket not valid (%s)", spn);
config 154 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "Failed to convert address (%s)", from);
config 159 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "Incorrect network address (%s)", from);
config 202 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 216 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "Failed to encrypt data: %s",
config 241 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 253 source4/heimdal/kdc/524.c if (!config->enable_v4_cross_realm && strcmp (et.crealm, t->realm) != 0) {
config 254 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "524 cross-realm %s -> %s disabled", et.crealm,
config 259 source4/heimdal/kdc/524.c ret = _kdc_encode_v4_ticket(context, config,
config 263 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 269 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 273 source4/heimdal/kdc/524.c ret = encrypt_v4_ticket(context, config, buf + sizeof(buf) - len, len,
config 276 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 310 source4/heimdal/kdc/524.c if(!config->enable_524) {
config 312 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 317 source4/heimdal/kdc/524.c ret = fetch_server (context, config, t, &spn, &server, from);
config 324 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 330 source4/heimdal/kdc/524.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 341 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 349 source4/heimdal/kdc/524.c kdc_log(context, config, 0,
config 354 source4/heimdal/kdc/524.c ret = log_524 (context, config, &et, from, spn);
config 360 source4/heimdal/kdc/524.c ret = verify_flags (context, config, &et, spn);
config 366 source4/heimdal/kdc/524.c ret = set_address (context, config, &et, addr, from);
config 372 source4/heimdal/kdc/524.c ret = encode_524_response(context, config, spn, et, t,
config 282 source4/heimdal/kdc/default_config.c *config = c;
config 68 source4/heimdal/kdc/digest.c config,
config 179 source4/heimdal/kdc/digest.c ret = _kdc_db_fetch(context, config, clientprincipal,
config 225 source4/heimdal/kdc/digest.c if(!config->enable_digest) {
config 226 source4/heimdal/kdc/digest.c kdc_log(context, config, 0,
config 238 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Digest request from %s", from);
config 242 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Can't open database for digest");
config 293 source4/heimdal/kdc/digest.c ret = _kdc_db_fetch(context, config, principal,
config 315 source4/heimdal/kdc/digest.c ret = _kdc_db_fetch(context, config, principal,
config 322 source4/heimdal/kdc/digest.c kdc_log(context, config, 0,
config 366 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Valid digest request from %s (%s)",
config 461 source4/heimdal/kdc/digest.c ret = get_digest_key(context, config, server, &crypto);
config 496 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Digest %s init request successful from %s",
config 578 source4/heimdal/kdc/digest.c ret = get_digest_key(context, config, server, &crypto);
config 615 source4/heimdal/kdc/digest.c if ((config->digests_allowed & CHAP_MD5) == 0) {
config 616 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Digest CHAP MD5 not allowed");
config 633 source4/heimdal/kdc/digest.c ret = get_password_entry(context, config,
config 659 source4/heimdal/kdc/digest.c kdc_log(context, config, 0,
config 671 source4/heimdal/kdc/digest.c if ((config->digests_allowed & DIGEST_MD5) == 0) {
config 672 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Digest SASL MD5 not allowed");
config 685 source4/heimdal/kdc/digest.c ret = get_password_entry(context, config,
config 777 source4/heimdal/kdc/digest.c kdc_log(context, config, 0,
config 792 source4/heimdal/kdc/digest.c if ((config->digests_allowed & MS_CHAP_V2) == 0) {
config 793 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "MS-CHAP-V2 not allowed");
config 851 source4/heimdal/kdc/digest.c ret = _kdc_db_fetch(context, config, clientprincipal,
config 892 source4/heimdal/kdc/digest.c kdc_log(context, config, 0,
config 977 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Digest %s request successful %s",
config 984 source4/heimdal/kdc/digest.c if ((config->digests_allowed & (NTLM_V1|NTLM_V1_SESSION|NTLM_V2)) == 0) {
config 985 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM not allowed");
config 994 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM client have no unicode");
config 1001 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM client doesn't support NTLM");
config 1089 source4/heimdal/kdc/digest.c ret = get_digest_key(context, config, server, &crypto);
config 1101 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM init from %s", from);
config 1126 source4/heimdal/kdc/digest.c ret = _kdc_db_fetch(context, config, clientprincipal,
config 1135 source4/heimdal/kdc/digest.c ret = get_digest_key(context, config, server, &crypto);
config 1145 source4/heimdal/kdc/digest.c kdc_log(context, config, 0,
config 1188 source4/heimdal/kdc/digest.c if ((config->digests_allowed & NTLM_V2) == 0) {
config 1189 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM v2 not allowed");
config 1234 source4/heimdal/kdc/digest.c if ((config->digests_allowed & NTLM_V1_SESSION) == 0) {
config 1235 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM v1-session not allowed");
config 1253 source4/heimdal/kdc/digest.c if ((config->digests_allowed & NTLM_V1) == 0) {
config 1254 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM v1 not allowed");
config 1333 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "NTLM version %d successful for %s",
config 1339 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "digest supportedMechs from %s", from);
config 1344 source4/heimdal/kdc/digest.c if (config->digests_allowed & NTLM_V1)
config 1346 source4/heimdal/kdc/digest.c if (config->digests_allowed & NTLM_V1_SESSION)
config 1348 source4/heimdal/kdc/digest.c if (config->digests_allowed & NTLM_V2)
config 1350 source4/heimdal/kdc/digest.c if (config->digests_allowed & DIGEST_MD5)
config 1352 source4/heimdal/kdc/digest.c if (config->digests_allowed & CHAP_MD5)
config 1354 source4/heimdal/kdc/digest.c if (config->digests_allowed & MS_CHAP_V2)
config 1371 source4/heimdal/kdc/digest.c kdc_log(context, config, 0, "Digest failed with: %s", s);
config 469 source4/heimdal/kdc/kaserver.c name, instance, config->v4_realm);
config 471 source4/heimdal/kdc/kaserver.c "krbtgt", config->v4_realm, config->v4_realm);
config 473 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "AS-REQ (kaserver) %s from %s for %s",
config 476 source4/heimdal/kdc/kaserver.c ret = _kdc_db_fetch4 (context, config, name, instance,
config 477 source4/heimdal/kdc/kaserver.c config->v4_realm, HDB_F_GET_CLIENT,
config 480 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "Client not found in database: %s: %s",
config 486 source4/heimdal/kdc/kaserver.c ret = _kdc_db_fetch4 (context, config, "krbtgt",
config 487 source4/heimdal/kdc/kaserver.c config->v4_realm, config->v4_realm,
config 490 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "Server not found in database: %s: %s",
config 496 source4/heimdal/kdc/kaserver.c ret = _kdc_check_flags (context, config,
config 508 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "no suitable DES key for client");
config 516 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "no suitable DES key for server");
config 540 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "preauth failed for %s", client_name);
config 569 source4/heimdal/kdc/kaserver.c name, instance, config->v4_realm,
config 572 source4/heimdal/kdc/kaserver.c "krbtgt", config->v4_realm,
config 691 source4/heimdal/kdc/kaserver.c "%s.%s@%s", name, instance, config->v4_realm);
config 693 source4/heimdal/kdc/kaserver.c ret = _kdc_db_fetch4 (context, config, name, instance,
config 694 source4/heimdal/kdc/kaserver.c config->v4_realm, HDB_F_GET_SERVER, &server_entry);
config 696 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "Server not found in database: %s: %s",
config 702 source4/heimdal/kdc/kaserver.c ret = _kdc_db_fetch4 (context, config, "krbtgt",
config 703 source4/heimdal/kdc/kaserver.c config->v4_realm, config->v4_realm, HDB_F_GET_KRBTGT, &krbtgt_entry);
config 705 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0,
config 707 source4/heimdal/kdc/kaserver.c "krbtgt", config->v4_realm, config->v4_realm,
config 716 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "no suitable DES key for krbtgt");
config 724 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "no suitable DES key for server");
config 738 source4/heimdal/kdc/kaserver.c config->v4_realm, &sname,
config 741 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0,
config 749 source4/heimdal/kdc/kaserver.c || strcmp (sinstance, config->v4_realm) != 0) {
config 750 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "no TGT: %s.%s for %s.%s@%s",
config 762 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "TGT expired: %s.%s@%s",
config 772 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0, "TGS-REQ (kaserver) %s from %s for %s",
config 775 source4/heimdal/kdc/kaserver.c ret = _kdc_db_fetch4 (context, config,
config 779 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0,
config 785 source4/heimdal/kdc/kaserver.c if (client_entry == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
config 786 source4/heimdal/kdc/kaserver.c kdc_log(context, config, 0,
config 793 source4/heimdal/kdc/kaserver.c ret = _kdc_check_flags (context, config,
config 925 source4/heimdal/kdc/kaserver.c do_authenticate (context, config, &hdr, sp, addr, from, reply);
config 928 source4/heimdal/kdc/kaserver.c do_getticket (context, config, &hdr, sp, addr, from, reply);
config 66 source4/heimdal/kdc/kerberos4.c krb5_kdc_configuration *config;
config 83 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch(context, ctx->config, princ, ctx->flags, NULL, &ent);
config 85 source4/heimdal/kdc/kerberos4.c kdc_log(context, ctx->config, 7, "Lookup %s failed: %s", s,
config 90 source4/heimdal/kdc/kerberos4.c kdc_log(context, ctx->config, 7, "Lookup %s succeeded", s);
config 107 source4/heimdal/kdc/kerberos4.c ctx.config = config;
config 114 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch(context, config, p, flags, NULL, ent);
config 151 source4/heimdal/kdc/kerberos4.c if(!config->enable_v4) {
config 152 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 162 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 191 source4/heimdal/kdc/kerberos4.c "%s.%s@%s", sname, sinst, config->v4_realm);
config 193 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "AS-REQ (krb4) %s from %s for %s",
config 196 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch4(context, config, name, inst, realm,
config 199 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "Client not found in database: %s: %s",
config 205 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch4(context, config, sname, sinst, config->v4_realm,
config 208 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "Server not found in database: %s: %s",
config 215 source4/heimdal/kdc/kerberos4.c ret = _kdc_check_flags (context, config,
config 226 source4/heimdal/kdc/kerberos4.c if (config->enable_v4_per_principal &&
config 229 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 242 source4/heimdal/kdc/kerberos4.c if (config->require_preauth
config 245 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 256 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "no suitable DES key for client");
config 264 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "no suitable DES key for server");
config 291 source4/heimdal/kdc/kerberos4.c config->v4_realm,
config 311 source4/heimdal/kdc/kerberos4.c config->v4_realm,
config 361 source4/heimdal/kdc/kerberos4.c config->v4_realm,
config 364 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 372 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch(context, config, tgt_princ,
config 376 source4/heimdal/kdc/kerberos4.c s = kdc_log_msg(context, config, 0, "Ticket-granting ticket not "
config 378 source4/heimdal/kdc/kerberos4.c realm, config->v4_realm,
config 386 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 389 source4/heimdal/kdc/kerberos4.c realm, config->v4_realm);
config 397 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 412 source4/heimdal/kdc/kerberos4.c if (config->check_ticket_addresses)
config 418 source4/heimdal/kdc/kerberos4.c config->v4_realm,
config 421 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "krb_rd_req: %d", ret);
config 434 source4/heimdal/kdc/kerberos4.c sname, sinst, config->v4_realm);
config 439 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "TGS-REQ (krb4) %s from %s for %s",
config 443 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 450 source4/heimdal/kdc/kerberos4.c if (!config->enable_v4_cross_realm && strcmp(realm, config->v4_realm) != 0) {
config 451 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 453 source4/heimdal/kdc/kerberos4.c realm, config->v4_realm);
config 460 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 467 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch4(context, config, ad.pname, ad.pinst, ad.prealm,
config 471 source4/heimdal/kdc/kerberos4.c s = kdc_log_msg(context, config, 0,
config 478 source4/heimdal/kdc/kerberos4.c if (client == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
config 480 source4/heimdal/kdc/kerberos4.c s = kdc_log_msg(context, config, 0,
config 488 source4/heimdal/kdc/kerberos4.c ret = _kdc_db_fetch4(context, config, sname, sinst, config->v4_realm,
config 492 source4/heimdal/kdc/kerberos4.c s = kdc_log_msg(context, config, 0,
config 500 source4/heimdal/kdc/kerberos4.c ret = _kdc_check_flags (context, config,
config 512 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0,
config 579 source4/heimdal/kdc/kerberos4.c config->v4_realm,
config 617 source4/heimdal/kdc/kerberos4.c kdc_log(context, config, 0, "Unknown message type (krb4): %d from %s",
config 205 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5,
config 240 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "out of memory");
config 248 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Client sent patypes: %s", str);
config 275 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Failed to encode ticket: %s",
config 281 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Internal error in ASN.1 encoder");
config 289 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 304 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Failed to encrypt data: %s",
config 309 source4/heimdal/kdc/kerberos5.c if(rep->msg_type == krb_as_rep && !config->encode_as_rep_as_tgs_rep)
config 314 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Failed to encode KDC-REP: %s",
config 320 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Internal error in ASN.1 encoder");
config 327 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 354 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Failed to encode KDC-REP: %s",
config 360 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Internal error in ASN.1 encoder");
config 426 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "unknown salt-type: %d",
config 729 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "out of memory");
config 737 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Client supported enctypes: %s", str);
config 748 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5, "Using %s/%s", cet, set);
config 754 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5, "Using e-types %d/%d", cetype, setype);
config 762 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 2, "Requested flags: %s", fixedstr);
config 784 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 790 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 799 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 809 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 820 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 833 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 839 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 845 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 854 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 864 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 874 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 900 source4/heimdal/kdc/kerberos5.c if(config->check_ticket_addresses == 0)
config 904 source4/heimdal/kdc/kerberos5.c return config->allow_null_ticket_addresses;
config 919 source4/heimdal/kdc/kerberos5.c return config->allow_null_ticket_addresses;
config 1011 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1023 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1045 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1050 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "AS-REQ %s from %s for %s",
config 1053 source4/heimdal/kdc/kerberos5.c ret = _kdc_db_fetch(context, config, client_princ,
config 1056 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "UNKNOWN -- %s: %s", client_name,
config 1062 source4/heimdal/kdc/kerberos5.c ret = _kdc_db_fetch(context, config, server_princ,
config 1066 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "UNKNOWN -- %s: %s", server_name,
config 1076 source4/heimdal/kdc/kerberos5.c ret = _kdc_check_flags(context, config,
config 1091 source4/heimdal/kdc/kerberos5.c log_patypes(context, config, req->padata);
config 1094 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5,
config 1110 source4/heimdal/kdc/kerberos5.c ret = _kdc_pk_rd_padata(context, config, req, pa, &pkp);
config 1113 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5,
config 1122 source4/heimdal/kdc/kerberos5.c config,
config 1131 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "%s", e_text);
config 1137 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1146 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5, "Looking for ENC-TS pa-data -- %s",
config 1167 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5, "Failed to decode PA-DATA -- %s",
config 1181 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5,
config 1185 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5,
config 1197 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 1215 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 5,
config 1241 source4/heimdal/kdc/kerberos5.c kdc_log(context, config,
config 1254 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1282 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 2,
config 1291 source4/heimdal/kdc/kerberos5.c if(found_pa == 0 && config->require_preauth)
config 1296 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "%s -- %s", e_text, client_name);
config 1300 source4/heimdal/kdc/kerberos5.c }else if (config->require_preauth
config 1342 source4/heimdal/kdc/kerberos5.c ret = get_pa_etype_info(context, config,
config 1346 source4/heimdal/kdc/kerberos5.c ret = get_pa_etype_info2(context, config, &method_data,
config 1359 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1375 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1380 source4/heimdal/kdc/kerberos5.c ret = _kdc_get_preferred_key(context, config,
config 1433 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1441 source4/heimdal/kdc/kerberos5.c log_as_req(context, config, cetype, setype, b);
config 1444 source4/heimdal/kdc/kerberos5.c || (f.request_anonymous && !config->allow_anonymous)) {
config 1446 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "Bad KDC options -- %s", client_name);
config 1474 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1482 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1490 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1496 source4/heimdal/kdc/kerberos5.c if(!_kdc_check_addresses(context, config, b->addresses, from_addr)) {
config 1498 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0,
config 1589 source4/heimdal/kdc/kerberos5.c && (config->kdc_warn_pwexpire == 0
config 1590 source4/heimdal/kdc/kerberos5.c || kdc_time + config->kdc_warn_pwexpire >= *client->entry.pw_end)) {
config 1643 source4/heimdal/kdc/kerberos5.c ret = _kdc_pk_mk_pa_reply(context, config, pkp, client,
config 1649 source4/heimdal/kdc/kerberos5.c config,
config 1723 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "PAC generation failed for -- %s",
config 1735 source4/heimdal/kdc/kerberos5.c kdc_log(context, config, 0, "PAC signing failed for -- %s",
config 1749 source4/heimdal/kdc/kerberos5.c _kdc_log_timestamp(context, config, "AS-REQ", et.authtime, et.starttime,
config 1754 source4/heimdal/kdc/kerberos5.c config,
config 1763 source4/heimdal/kdc/kerberos5.c ret = _kdc_encode_reply(context, config,
config 1773 source4/heimdal/kdc/kerberos5.c if (datagram_reply && reply->length > config->max_datagram_reply_length) {
config 369 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 374 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 381 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 388 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 396 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 408 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 416 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 428 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 436 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 445 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Ticket cannot be postdated");
config 451 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 463 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 479 source4/heimdal/kdc/krb5tgs.c if(f.request_anonymous && !config->allow_anonymous){
config 480 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 514 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 530 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Ticket expired (%s)", pstr);
config 534 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Ticket not valid (%s)", pstr);
config 569 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 573 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 610 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 625 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 697 source4/heimdal/kdc/krb5tgs.c ret = check_tgs_flags(context, config, b, tgt, &et);
config 710 source4/heimdal/kdc/krb5tgs.c (config->trpolicy == TRPOLICY_ALWAYS_CHECK)
config 712 source4/heimdal/kdc/krb5tgs.c (config->trpolicy == TRPOLICY_ALLOW_PER_PRINCIPAL)
config 714 source4/heimdal/kdc/krb5tgs.c (config->trpolicy == TRPOLICY_ALWAYS_HONOUR_REQUEST)
config 720 source4/heimdal/kdc/krb5tgs.c ret = fix_transited_encoding(context, config,
config 859 source4/heimdal/kdc/krb5tgs.c _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime,
config 868 source4/heimdal/kdc/krb5tgs.c config,
config 908 source4/heimdal/kdc/krb5tgs.c ret = _kdc_encode_reply(context, config,
config 949 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "No authenticator in request");
config 963 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Bad checksum type in authenticator: %d",
config 972 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Failed to encode KDC-REQ-BODY: %s",
config 978 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Internal error in ASN.1 encoder");
config 986 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 999 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1043 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Searching referral for %s", name);
config 1079 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Failed to decode AP-REQ: %s",
config 1086 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "PA-DATA is not a ticket-granting ticket");
config 1096 source4/heimdal/kdc/krb5tgs.c ret = _kdc_db_fetch(context, config, princ, HDB_F_GET_KRBTGT, NULL, krbtgt);
config 1104 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1121 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1141 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1168 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Failed to verify AP-REQ: %s",
config 1181 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "malloc failed");
config 1188 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "malloc failed");
config 1196 source4/heimdal/kdc/krb5tgs.c ret = tgs_check_authenticator(context, config,
config 1213 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Failed to get remote subkey: %s",
config 1222 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Failed to get session key: %s",
config 1229 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1237 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 1249 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1266 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Failed to decode authorization data");
config 1412 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1418 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1424 source4/heimdal/kdc/krb5tgs.c ret = _kdc_db_fetch(context, config, p,
config 1445 source4/heimdal/kdc/krb5tgs.c ret = verify_flags(context, config, &adtkt, spn);
config 1465 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1469 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1477 source4/heimdal/kdc/krb5tgs.c ret = _kdc_db_fetch(context, config, sp, HDB_F_GET_SERVER | HDB_F_CANON,
config 1489 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 5, "krbtgt for realm %s "
config 1506 source4/heimdal/kdc/krb5tgs.c } else if(need_referral(context, config, &b->kdc_options, sp, &realms)) {
config 1508 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 5,
config 1529 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1537 source4/heimdal/kdc/krb5tgs.c ret = _kdc_db_fetch(context, config, cp, HDB_F_GET_CLIENT | HDB_F_CANON,
config 1555 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 1, "Client no longer in database: %s",
config 1560 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 1, "Client not found in database: %s: %s",
config 1580 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1593 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1622 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1636 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1641 source4/heimdal/kdc/krb5tgs.c ret = check_PAC(context, config, cp,
config 1645 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1653 source4/heimdal/kdc/krb5tgs.c config,
config 1659 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1687 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Failed to decode PA-S4U2Self");
config 1699 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "krb5_crypto_init failed: %s",
config 1714 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1737 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "S4U2Self: %s is not allowed "
config 1757 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "s4u2self %s impersonating %s to "
config 1783 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1800 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1808 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1815 source4/heimdal/kdc/krb5tgs.c ret = check_constrained_delegation(context, config, client, sp);
config 1817 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1834 source4/heimdal/kdc/krb5tgs.c ret = verify_flags(context, config, &adtkt, str);
config 1844 source4/heimdal/kdc/krb5tgs.c config,
config 1852 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1861 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "constrained delegation for %s "
config 1870 source4/heimdal/kdc/krb5tgs.c ret = _kdc_check_flags(context, config,
config 1881 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Inconsistent request.");
config 1887 source4/heimdal/kdc/krb5tgs.c if(!_kdc_check_addresses(context, config, tgt->caddr, from_addr)) {
config 1889 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0, "Request from wrong address");
config 1901 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1908 source4/heimdal/kdc/krb5tgs.c ret = build_server_referral(context, config, crypto, ref_realm,
config 1912 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1921 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 1932 source4/heimdal/kdc/krb5tgs.c config,
config 2007 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 2017 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 2021 source4/heimdal/kdc/krb5tgs.c ret = tgs_parse_request(context, config,
config 2031 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 2037 source4/heimdal/kdc/krb5tgs.c config,
config 2050 source4/heimdal/kdc/krb5tgs.c kdc_log(context, config, 0,
config 2056 source4/heimdal/kdc/krb5tgs.c if (datagram_reply && data->length > config->max_datagram_reply_length) {
config 155 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Principal is not a user");
config 172 source4/heimdal/kdc/kx509.c ret = hx509_certs_init(hxctx, config->kx509_ca, 0,
config 175 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Failed to load CA %s",
config 176 source4/heimdal/kdc/kx509.c config->kx509_ca);
config 192 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Failed to find a CA in %s",
config 193 source4/heimdal/kdc/kx509.c config->kx509_ca);
config 228 source4/heimdal/kdc/kx509.c ret = hx509_certs_init(hxctx, config->kx509_template, 0,
config 231 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Failed to load template %s",
config 232 source4/heimdal/kdc/kx509.c config->kx509_template);
config 238 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Failed to find template in %s",
config 239 source4/heimdal/kdc/kx509.c config->kx509_template);
config 309 source4/heimdal/kdc/kx509.c if(!config->enable_kx509) {
config 310 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0,
config 315 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Kx509 request from %s", from);
config 319 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Can't open database for digest");
config 401 source4/heimdal/kdc/kx509.c ret = build_certificate(context, config, &req->pk_key,
config 438 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Successful Kx509 request for %s", cname);
config 42 source4/heimdal/kdc/log.c krb5_initlog(context, "kdc", &config->logf);
config 48 source4/heimdal/kdc/log.c krb5_addlog_dest(context, config->logf, *p);
config 53 source4/heimdal/kdc/log.c krb5_addlog_dest(context, config->logf, s);
config 56 source4/heimdal/kdc/log.c krb5_set_warn_dest(context, config->logf);
config 65 source4/heimdal/kdc/log.c krb5_vlog_msg(context, config->logf, &msg, level, fmt, ap);
config 77 source4/heimdal/kdc/log.c s = kdc_log_msg_va(context, config, level, fmt, ap);
config 90 source4/heimdal/kdc/log.c s = kdc_log_msg_va(context, config, level, fmt, ap);
config 58 source4/heimdal/kdc/misc.c for(i = 0; i < config->num_db; i++) {
config 59 source4/heimdal/kdc/misc.c ret = config->db[i]->hdb_open(context, config->db[i], O_RDONLY, 0);
config 61 source4/heimdal/kdc/misc.c kdc_log(context, config, 0, "Failed to open database: %s",
config 65 source4/heimdal/kdc/misc.c ret = config->db[i]->hdb_fetch(context,
config 66 source4/heimdal/kdc/misc.c config->db[i],
config 70 source4/heimdal/kdc/misc.c config->db[i]->hdb_close(context, config->db[i]);
config 73 source4/heimdal/kdc/misc.c *db = config->db[i];
config 296 source4/heimdal/kdc/pkinit.c ret = _krb5_dh_group_ok(context, config->pkinit_dh_min_bits,
config 372 source4/heimdal/kdc/pkinit.c if (!config->enable_pkinit) {
config 373 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0, "PK-INIT request but PK-INIT not enabled");
config 606 source4/heimdal/kdc/pkinit.c ret = get_dh_param(context, config,
config 634 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0, "PK-INIT request of type %s", type);
config 698 source4/heimdal/kdc/pkinit.c && config->pkinit_require_binding == 0)
config 973 source4/heimdal/kdc/pkinit.c if (!config->enable_pkinit) {
config 1014 source4/heimdal/kdc/pkinit.c config,
config 1086 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0, "PK-INIT using %s %s", type, other);
config 1110 source4/heimdal/kdc/pkinit.c config,
config 1154 source4/heimdal/kdc/pkinit.c if (config->pkinit_kdc_ocsp_file) {
config 1165 source4/heimdal/kdc/pkinit.c fd = open(config->pkinit_kdc_ocsp_file, O_RDONLY);
config 1167 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1175 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1183 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1191 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1203 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1267 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1273 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1320 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1327 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0, "Decode of MS-UPN-SAN failed");
config 1331 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0, "found MS UPN SAN: %s", upn);
config 1336 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0, "Failed to parse principal in MS UPN SAN");
config 1385 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 0,
config 1389 source4/heimdal/kdc/pkinit.c if (config->pkinit_princ_in_cert) {
config 1390 source4/heimdal/kdc/pkinit.c ret = match_rfc_san(context, config,
config 1395 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 5,
config 1399 source4/heimdal/kdc/pkinit.c ret = match_ms_upn_san(context, config,
config 1404 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 5,
config 1426 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 5,
config 1442 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 5,
config 1452 source4/heimdal/kdc/pkinit.c kdc_log(context, config, 5,
config 1606 source4/heimdal/kdc/pkinit.c config->enable_pkinit = 0;
config 81 source4/heimdal/kdc/process.c ret = _kdc_as_rep(context, config, &req, &req_buffer,
config 86 source4/heimdal/kdc/process.c ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply);
config 90 source4/heimdal/kdc/process.c ret = _kdc_do_524(context, config, &ticket, reply, from, addr);
config 94 source4/heimdal/kdc/process.c ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr);
config 98 source4/heimdal/kdc/process.c ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr);
config 103 source4/heimdal/kdc/process.c ret = _kdc_do_version4(context, config, buf, len, reply, from,
config 106 source4/heimdal/kdc/process.c } else if (config->enable_kaserver) {
config 107 source4/heimdal/kdc/process.c ret = _kdc_do_kaserver(context, config, buf, len, reply, from,
config 142 source4/heimdal/kdc/process.c ret = _kdc_as_rep(context, config, &req, &req_buffer,
config 147 source4/heimdal/kdc/process.c ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply);
config 336 source4/kdc/kdc.c kdc->config,
config 622 source4/kdc/kdc.c ret = kdc->config->db[0]->hdb_fetch(kdc->smb_krb5_context->krb5_context,
config 623 source4/kdc/kdc.c kdc->config->db[0],
config 720 source4/kdc/kdc.c &kdc->config);
config 726 source4/kdc/kdc.c kdc->config->logf = kdc->smb_krb5_context->logf;
config 727 source4/kdc/kdc.c kdc->config->db = talloc(kdc, struct HDB *);
config 728 source4/kdc/kdc.c if (!kdc->config->db) {
config 732 source4/kdc/kdc.c kdc->config->num_db = 1;
config 736 source4/kdc/kdc.c &kdc->config->db[0], NULL);
config 50 source4/kdc/kdc.h krb5_kdc_configuration *config;
config 44 source4/nbt_server/wins/winsserver.c ttl = MIN(ttl, winssrv->config.max_renew_interval);
config 45 source4/nbt_server/wins/winsserver.c ttl = MAX(ttl, winssrv->config.min_renew_interval);
config 949 source4/nbt_server/wins/winsserver.c rec->expire_time= time(NULL) + winssrv->config.max_renew_interval;
config 970 source4/nbt_server/wins/winsserver.c rec->expire_time= time(NULL) + winssrv->config.tombstone_interval;
config 974 source4/nbt_server/wins/winsserver.c winssrv->config.tombstone_interval +
config 975 source4/nbt_server/wins/winsserver.c winssrv->config.tombstone_timeout;
config 1040 source4/nbt_server/wins/winsserver.c nbtsrv->winssrv->config.max_renew_interval = lp_max_wins_ttl(nbtsrv->task->lp_ctx);
config 1041 source4/nbt_server/wins/winsserver.c nbtsrv->winssrv->config.min_renew_interval = lp_min_wins_ttl(nbtsrv->task->lp_ctx);
config 1043 source4/nbt_server/wins/winsserver.c nbtsrv->winssrv->config.tombstone_interval = tmp;
config 1045 source4/nbt_server/wins/winsserver.c nbtsrv->winssrv->config.tombstone_timeout = tmp;
config 48 source4/nbt_server/wins/winsserver.h } config;
config 146 source4/ntvfs/cifs/vfs_cifs.c struct share_config *scfg = ntvfs->ctx->config;
config 42 source4/ntvfs/cifs_posix_cli/vfs_cifs_posix.c #define CHECK_READ_ONLY(req) do { if (share_bool_option(ntvfs->ctx->config, SHARE_READONLY, true)) return NT_STATUS_ACCESS_DENIED; } while (0)
config 55 source4/ntvfs/cifs_posix_cli/vfs_cifs_posix.c struct share_config *scfg = ntvfs->ctx->config;
config 322 source4/ntvfs/cifs_posix_cli/vfs_cifs_posix.c readonly = share_bool_option(ntvfs->ctx->config, SHARE_READONLY, SHARE_READONLY_DEFAULT);
config 778 source4/ntvfs/cifs_posix_cli/vfs_cifs_posix.c fs->generic.out.volume_name = talloc_strdup(req, ntvfs->ctx->config->name);
config 104 source4/ntvfs/common/opendb_tdb.c odb->oplocks = share_bool_option(ntvfs_ctx->config, SHARE_OPLOCKS, SHARE_OPLOCKS_DEFAULT);
config 106 source4/ntvfs/common/opendb_tdb.c odb->lease_ctx = sys_lease_context_create(ntvfs_ctx->config, odb,
config 199 source4/ntvfs/ntvfs.h struct share_config *config;
config 173 source4/ntvfs/ntvfs_base.c ctx->config = talloc_steal(ctx, scfg);
config 40 source4/ntvfs/posix/vfs_posix.c struct share_config *scfg = pvfs->ntvfs->ctx->config;
config 189 source4/ntvfs/posix/vfs_posix.c base_directory = talloc_strdup(pvfs, share_string_option(ntvfs->ctx->config, SHARE_PATH, ""));
config 233 source4/ntvfs/posix/vfs_posix.c pvfs->ntvfs->ctx->config);
config 87 source4/ntvfs/print/vfs_print.c push_string(p+18, ntvfs->ctx->config->name, 13, STR_TERMINATE|STR_ASCII);
config 41 source4/ntvfs/simple/vfs_simple.c #define CHECK_READ_ONLY(req) do { if (share_bool_option(ntvfs->ctx->config, SHARE_READONLY, true)) return NT_STATUS_ACCESS_DENIED; } while (0)
config 54 source4/ntvfs/simple/vfs_simple.c struct share_config *scfg = ntvfs->ctx->config;
config 319 source4/ntvfs/simple/vfs_simple.c readonly = share_bool_option(ntvfs->ctx->config, SHARE_READONLY, SHARE_READONLY_DEFAULT);
config 775 source4/ntvfs/simple/vfs_simple.c fs->generic.out.volume_name = talloc_strdup(req, ntvfs->ctx->config->name);
config 163 source4/ntvfs/smb2/vfs_smb2.c struct share_config *scfg = ntvfs->ctx->config;
config 145 source4/smb_server/session.c if (smb_conn->config.security == SEC_SHARE) return NULL;
config 502 source4/smb_server/smb/receive.c if (smb_conn->config.security == SEC_SHARE) {
config 529 source4/smb_server/smb/receive.c if (req->smb_conn->config.nt_status_support &&
config 561 source4/smb_server/smb/receive.c if (req->smb_conn->config.nt_status_support &&
config 677 source4/smb_server/smb/receive.c smb_conn->config.security = lp_security(lp_ctx);
config 678 source4/smb_server/smb/receive.c smb_conn->config.nt_status_support = lp_nt_status_support(lp_ctx);
config 349 source4/smb_server/smb/request.c if (!req->smb_conn->config.nt_status_support || !(req->smb_conn->negotiate.client_caps & CAP_STATUS32)) {
config 210 source4/smb_server/smb/service.c con->tconx.out.options = SMB_SUPPORT_SEARCH_BITS | (share_int_option(req->tcon->ntvfs->config, SHARE_CSC_POLICY, SHARE_CSC_POLICY_DEFAULT) << 2);
config 211 source4/smb_server/smb/service.c if (share_bool_option(req->tcon->ntvfs->config, SHARE_MSDFS_ROOT, SHARE_MSDFS_ROOT_DEFAULT) && lp_host_msdfs(req->smb_conn->lp_ctx)) {
config 643 source4/smb_server/smb2/receive.c smb_conn->config.security = SEC_USER;
config 644 source4/smb_server/smb2/receive.c smb_conn->config.nt_status_support = true;
config 375 source4/smb_server/smb_server.h } config;
config 685 source4/wrepl_server/wrepl_apply_records.c rec->expire_time= time(NULL) + partner->service->config.verify_interval;
config 730 source4/wrepl_server/wrepl_apply_records.c rec->expire_time= time(NULL) + partner->service->config.verify_interval;
config 833 source4/wrepl_server/wrepl_apply_records.c merge->expire_time = time(NULL) + partner->service->config.verify_interval;
config 1207 source4/wrepl_server/wrepl_apply_records.c merge->expire_time = time(NULL) + partner->service->config.verify_interval;
config 56 source4/wrepl_server/wrepl_periodic.c status = wreplsrv_periodic_schedule(service, service->config.periodic_interval);
config 84 source4/wrepl_server/wrepl_scavenging.c service->config.tombstone_extra_timeout,
config 120 source4/wrepl_server/wrepl_scavenging.c rec->expire_time= service->config.tombstone_interval + now;
config 129 source4/wrepl_server/wrepl_scavenging.c rec->addresses[i]->expire_time= service->config.renew_interval + now;
config 136 source4/wrepl_server/wrepl_scavenging.c rec->expire_time= service->config.renew_interval + now;
config 148 source4/wrepl_server/wrepl_scavenging.c service->config.tombstone_interval +
config 149 source4/wrepl_server/wrepl_scavenging.c service->config.tombstone_timeout;
config 158 source4/wrepl_server/wrepl_scavenging.c rec->expire_time= service->config.tombstone_timeout + now;
config 237 source4/wrepl_server/wrepl_scavenging.c service->config.tombstone_extra_timeout,
config 264 source4/wrepl_server/wrepl_scavenging.c rec->expire_time= service->config.tombstone_timeout + now;
config 375 source4/wrepl_server/wrepl_scavenging.c rec->expire_time= time(NULL) + s->service->config.tombstone_timeout;
config 385 source4/wrepl_server/wrepl_scavenging.c rec->expire_time = time(NULL) + s->service->config.verify_interval;
config 520 source4/wrepl_server/wrepl_scavenging.c service->scavenging.next_run = timeval_current_ofs(service->config.scavenging_interval, 0);
config 521 source4/wrepl_server/wrepl_scavenging.c status = wreplsrv_periodic_schedule(service, service->config.scavenging_interval);
config 90 source4/wrepl_server/wrepl_server.c service->config.ldb = wins_config_db_connect(service, service->task->event_ctx, lp_ctx);
config 91 source4/wrepl_server/wrepl_server.c if (!service->config.ldb) {
config 96 source4/wrepl_server/wrepl_server.c service->config.renew_interval = lp_parm_int(lp_ctx, NULL,"wreplsrv","renew_interval", 6*24*60*60);
config 99 source4/wrepl_server/wrepl_server.c service->config.tombstone_interval= lp_parm_int(lp_ctx, NULL,"wreplsrv","tombstone_interval", 6*24*60*60);
config 102 source4/wrepl_server/wrepl_server.c service->config.tombstone_timeout = lp_parm_int(lp_ctx, NULL,"wreplsrv","tombstone_timeout", 1*24*60*60);
config 105 source4/wrepl_server/wrepl_server.c service->config.tombstone_extra_timeout = lp_parm_int(lp_ctx, NULL,"wreplsrv","tombstone_extra_timeout", 3*24*60*60);
config 108 source4/wrepl_server/wrepl_server.c service->config.verify_interval = lp_parm_int(lp_ctx, NULL,"wreplsrv","verify_interval", 24*24*60*60);
config 111 source4/wrepl_server/wrepl_server.c service->config.scavenging_interval=lp_parm_int(lp_ctx, NULL,"wreplsrv","scavenging_interval",
config 112 source4/wrepl_server/wrepl_server.c service->config.renew_interval/2);
config 115 source4/wrepl_server/wrepl_server.c service->config.periodic_interval = lp_parm_int(lp_ctx, NULL,"wreplsrv","periodic_interval", 15);
config 145 source4/wrepl_server/wrepl_server.c new_seqnumber = wins_config_db_get_seqnumber(service->config.ldb);
config 148 source4/wrepl_server/wrepl_server.c if (service->config.seqnumber != 0 && service->config.seqnumber == new_seqnumber) {
config 155 source4/wrepl_server/wrepl_server.c service->config.seqnumber = new_seqnumber;
config 158 source4/wrepl_server/wrepl_server.c ret = ldb_search(service->config.ldb, tmp_ctx, &res,
config 159 source4/wrepl_server/wrepl_server.c ldb_dn_new(tmp_ctx, service->config.ldb, "CN=PARTNERS"),
config 217 source4/wrepl_server/wrepl_server.c res->count, (unsigned long long)service->config.seqnumber));
config 265 source4/wrepl_server/wrepl_server.h } config;