Home
last modified time | relevance | path

Searched refs:upns (Results 1 – 5 of 5) sorted by relevance

/src/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_srv.c183 char **upns = NULL; in verify_client_san() local
193 plgctx->opts->allow_upn ? &upns : NULL, in verify_client_san()
201 if (princs == NULL && upns == NULL) { in verify_client_san()
231 if (upns == NULL) { in verify_client_san()
239 for (i = 0; upns[i] != NULL; i++) { in verify_client_san()
242 __FUNCTION__, client_string, upns[i]); in verify_client_san()
244 retval = krb5_parse_name_flags(context, upns[i], in verify_client_san()
247 TRACE_PKINIT_SERVER_UPN_PARSE_FAIL(context, upns[i], retval); in verify_client_san()
268 if (upns != NULL) { in verify_client_san()
269 for (i = 0; upns[i] != NULL; i++) in verify_client_san()
[all …]
H A Dpkinit_trace.h200 #define TRACE_PKINIT_SAN_CERT_COUNT(c, count, princ, upns, dns, cert) \ argument
203 upns, dns, cert)
H A Dpkinit_matching.c492 for (i = 0; md->upns != NULL && md->upns[i] != NULL; i++) { in component_match()
493 match = regexp_match(context, rc, md->upns[i], idx); in component_match()
H A Dpkinit_crypto_openssl.c2317 char **upns = NULL; in crypto_retrieve_X509_sans() local
2362 upns = calloc(num_sans + 1, sizeof(*upns)); in crypto_retrieve_X509_sans()
2363 if (upns == NULL) { in crypto_retrieve_X509_sans()
2397 } else if (upns != NULL && in crypto_retrieve_X509_sans()
2403 upns[u] = k5memdup0(name.data, name.length, &retval); in crypto_retrieve_X509_sans()
2404 if (upns[u] == NULL) in crypto_retrieve_X509_sans()
2445 if (upns != NULL && *upns != NULL) { in crypto_retrieve_X509_sans()
2446 *upn_ret = upns; in crypto_retrieve_X509_sans()
2447 upns = NULL; in crypto_retrieve_X509_sans()
2458 for (i = 0; upns != NULL && upns[i] != NULL; i++) in crypto_retrieve_X509_sans()
[all …]
H A Dpkinit_crypto.h100 char **upns; /* Null-terimnated array of UPN SANs */ member