KRB5_KDB_DISALLOW_SVR
{ "disallow-svr", KRB5_KDB_DISALLOW_SVR },
flags->server = !(attr & KRB5_KDB_DISALLOW_SVR);
a |= KRB5_KDB_DISALLOW_SVR;
if (entry->attributes & KRB5_KDB_DISALLOW_SVR)
entry->attributes |= KRB5_KDB_DISALLOW_SVR;
flags->server = !(attr & KRB5_KDB_DISALLOW_SVR);
out->attributes |= ent.entry.flags.server ? 0 : KRB5_KDB_DISALLOW_SVR;
if (server->attributes & KRB5_KDB_DISALLOW_SVR ||
if (isflagset(server->attributes, KRB5_KDB_DISALLOW_SVR)) {
if ((server->attributes & KRB5_KDB_DISALLOW_SVR) &&
{"allow_svr", KRB5_KDB_DISALLOW_SVR, 1},
{"service", KRB5_KDB_DISALLOW_SVR, 1},
{"disallow_svr", KRB5_KDB_DISALLOW_SVR, 0},
if (db_entry->attributes & KRB5_KDB_DISALLOW_SVR
policyparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_SVR);
policyparams->tktflags |= KRB5_KDB_DISALLOW_SVR;
policyparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_SVR);
policyparams->tktflags |= KRB5_KDB_DISALLOW_SVR;
if (ticketflags & KRB5_KDB_DISALLOW_SVR)
if (ticketflags & KRB5_KDB_DISALLOW_SVR)
rparams->tktflags &= (int)(~KRB5_KDB_DISALLOW_SVR);
rparams->tktflags |= KRB5_KDB_DISALLOW_SVR;