Searched refs:upns (Results 1 – 5 of 5) sorted by relevance
| /src/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_srv.c | 183 char **upns = NULL; in verify_client_san() local 193 plgctx->opts->allow_upn ? &upns : NULL, in verify_client_san() 201 if (princs == NULL && upns == NULL) { in verify_client_san() 231 if (upns == NULL) { in verify_client_san() 239 for (i = 0; upns[i] != NULL; i++) { in verify_client_san() 242 __FUNCTION__, client_string, upns[i]); in verify_client_san() 244 retval = krb5_parse_name_flags(context, upns[i], in verify_client_san() 247 TRACE_PKINIT_SERVER_UPN_PARSE_FAIL(context, upns[i], retval); in verify_client_san() 268 if (upns != NULL) { in verify_client_san() 269 for (i = 0; upns[i] != NULL; i++) in verify_client_san() [all …]
|
| H A D | pkinit_trace.h | 200 #define TRACE_PKINIT_SAN_CERT_COUNT(c, count, princ, upns, dns, cert) \ argument 203 upns, dns, cert)
|
| H A D | pkinit_matching.c | 492 for (i = 0; md->upns != NULL && md->upns[i] != NULL; i++) { in component_match() 493 match = regexp_match(context, rc, md->upns[i], idx); in component_match()
|
| H A D | pkinit_crypto_openssl.c | 2317 char **upns = NULL; in crypto_retrieve_X509_sans() local 2362 upns = calloc(num_sans + 1, sizeof(*upns)); in crypto_retrieve_X509_sans() 2363 if (upns == NULL) { in crypto_retrieve_X509_sans() 2397 } else if (upns != NULL && in crypto_retrieve_X509_sans() 2403 upns[u] = k5memdup0(name.data, name.length, &retval); in crypto_retrieve_X509_sans() 2404 if (upns[u] == NULL) in crypto_retrieve_X509_sans() 2445 if (upns != NULL && *upns != NULL) { in crypto_retrieve_X509_sans() 2446 *upn_ret = upns; in crypto_retrieve_X509_sans() 2447 upns = NULL; in crypto_retrieve_X509_sans() 2458 for (i = 0; upns != NULL && upns[i] != NULL; i++) in crypto_retrieve_X509_sans() [all …]
|
| H A D | pkinit_crypto.h | 100 char **upns; /* Null-terimnated array of UPN SANs */ member
|