/sssd/src/providers/krb5/ |
H A D | krb5_keytab.c | 35 krb5_keytab_entry entry; local 44 memset(&entry, 0, sizeof(entry)); 45 while ((kt_err = krb5_kt_next_entry(kctx, s_keytab, &entry, 47 kerr = krb5_kt_add_entry(kctx, d_keytab, &entry); 59 kerr = sss_krb5_free_keytab_entry_contents(kctx, &entry); 61 DEBUG(SSSDBG_MINOR_FAILURE, "Failed to free keytab entry.\n"); 70 memset(&entry, 0, sizeof(entry));
|
H A D | krb5_delayed_online_authentication.c | 149 hash_entry_t *entry; local 168 while ((entry = iter->next(iter)) != NULL) { 170 key.ul = entry->key.ul; 171 pd = talloc_get_type(entry->value.ptr, struct pam_data); 202 &entry->key);
|
H A D | krb5_wait_queue.c | 85 static void wait_queue_del_cb(hash_entry_t *entry, hash_destroy_enum type, argument 90 if (entry->value.type == HASH_VALUE_PTR) { 91 head = talloc_get_type(entry->value.ptr, struct queue_entry); 97 "Unexpected value type [%d].\n", entry->value.type);
|
H A D | krb5_renew_tgt.c | 121 "removing list entry for user [%s].\n", 305 static void renew_del_cb(hash_entry_t *entry, hash_destroy_enum type, void *pvt) argument 309 if (entry->value.type == HASH_VALUE_PTR) { 310 renew_data = talloc_get_type(entry->value.ptr, struct renew_data); 316 "Unexpected value type [%d].\n", entry->value.type);
|
H A D | krb5_child.c | 1084 krb5_keytab_entry entry; local 1107 /* We look for the first entry from our realm or take the last one */ 1108 memset(&entry, 0, sizeof(entry)); 1109 while ((kt_err = krb5_kt_next_entry(kr->ctx, keytab, &entry, &cursor)) == 0) { 1114 kerr = krb5_copy_principal(kr->ctx, entry.principal, 1121 kerr = sss_krb5_free_keytab_entry_contents(kr->ctx, &entry); 1123 DEBUG(SSSDBG_MINOR_FAILURE, "Failed to free keytab entry.\n"); 1125 memset(&entry, 0, sizeof(entry)); [all...] |
/sssd/src/util/ |
H A D | nscd.c | 143 char *line, *entry, *service, *enabled, *pad; local 162 entry = line; 163 while (isspace(*entry) && *entry != '\0') { 164 entry++; 167 pad = entry; 195 if (!strcmp(entry, "enable-cache") &&
|
H A D | sss_krb5.c | 354 krb5_keytab_entry entry; local 366 memset(&entry, 0, sizeof(entry)); 367 while ((kt_err = krb5_kt_next_entry(ctx, keytab, &entry, &cursor)) == 0) { 368 principal_found = match_principal(ctx, entry.principal, pattern_primary, pattern_realm); 373 kerr = sss_krb5_free_keytab_entry_contents(ctx, &entry); 375 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to free keytab entry.\n"); 377 memset(&entry, 0, sizeof(entry)); 403 kerr = krb5_copy_principal(ctx, entry 803 sss_krb5_free_keytab_entry_contents(krb5_context context, krb5_keytab_entry *entry) argument 810 sss_krb5_free_keytab_entry_contents(krb5_context context, krb5_keytab_entry *entry) argument 880 krb5_keytab_entry entry; local [all...] |
/sssd/src/responder/common/ |
H A D | responder_cmd.c | 199 struct setent_req_list *entry = local 201 DLIST_REMOVE(*(entry->head), entry); 210 struct setent_req_list *entry; local 212 entry = talloc_zero(memctx, struct setent_req_list); 213 if (!entry) { 217 entry->req = req; 218 entry->pvt = pvt; 219 DLIST_ADD_END(*list, entry, struct setent_req_list *); 220 entry [all...] |
/sssd/src/sbus/ |
H A D | sssd_dbus_invokers.c | 316 hash_entry_t *entry; local 350 while ((entry = table_iter->next(table_iter)) != NULL) { 351 if (entry->key.type != HASH_KEY_STRING || entry->key.str == NULL 352 || entry->value.type != HASH_VALUE_PTR 353 || entry->value.ptr == NULL) { 365 /* append key as dict entry key */ 369 &entry->key.str); 386 values = entry->value.ptr;
|
/sssd/src/providers/ad/ |
H A D | ad_pac.c | 175 hash_entry_t *entry; local 330 while ((entry = iter->next(iter)) != NULL) { 331 sid_list[c] = talloc_strdup(sid_list, entry->key.str); 403 DEBUG(SSSDBG_OP_FAILURE, "Missing user name in cache entry.\n");
|
H A D | ad_gpo.c | 444 struct gpo_map_option_entry entry = gpo_map_option_entries[i]; local 447 entry.ad_basic_opt); 449 ret = ad_gpo_parse_map_option(access_ctx, entry.gpo_map_type, 451 entry_config, entry.gpo_map_defaults); 604 DEBUG(SSSDBG_CRIT_FAILURE, "Missing SID for cache entry [%s].\n", 681 * user_sid and group_sids against the specified access control entry (ACE). 761 * user_sid and group_sids against each access control entry (ACE) in the DACL. 1229 struct gpo_map_option_entry entry = gpo_map_option_entries[i]; local 1231 allow_key = entry.allow_key; 1257 deny_key = entry [all...] |
/sssd/src/providers/ldap/ |
H A D | ldap_child.c | 204 krb5_keytab_entry entry; local 221 while ((krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) { 222 krberr = krb5_unparse_name(context, entry.principal, &kt_principal); 225 "Could not parse keytab entry\n"); 226 sss_log(SSS_LOG_ERR, "Could not parse keytab entry\n"); 234 krberr = sss_krb5_free_keytab_entry_contents(context, &entry); 239 DEBUG(SSSDBG_CRIT_FAILURE,"Could not free keytab entry contents\n");
|
H A D | sdap_async_autofs.c | 54 get_autofs_entry_attr(struct sysdb_attrs *entry, struct sdap_options *opts, argument 60 ret = sysdb_attrs_get_el(entry, 66 "Expected one entry got %d\n", el->num_values); 74 get_autofs_entry_key(struct sysdb_attrs *entry, struct sdap_options *opts) argument 76 return get_autofs_entry_attr(entry, opts, SDAP_AT_AUTOFS_ENTRY_KEY); 80 get_autofs_entry_value(struct sysdb_attrs *entry, struct sdap_options *opts) argument 82 return get_autofs_entry_attr(entry, opts, SDAP_AT_AUTOFS_ENTRY_VALUE); 89 struct sysdb_attrs *entry) 94 key = get_autofs_entry_key(entry, opts); 96 DEBUG(SSSDBG_OP_FAILURE, "Could not get autofs entry ke 86 add_autofs_entry(struct sss_domain_info *domain, const char *map, struct sdap_options *opts, struct sysdb_attrs *entry) argument 121 struct sysdb_attrs *entry; local [all...] |
H A D | sdap.c | 215 /* index must be incremented only for appended entry. */ 446 "Unknown entry type, no objectClasses found!\n"); 453 /* ok it's an entry of the right type */ 703 "Dereferenced entry [%s] has no attributes, skipping\n", 742 "Unknown entry type, no objectClasses found!\n"); 1542 int sdap_replace_id(struct sysdb_attrs *entry, const char *attr, id_t val) argument 1548 ret = sysdb_attrs_get_el_ext(entry, attr, false, &el); 1550 return sysdb_attrs_add_uint32(entry, attr, val); 1562 str = talloc_asprintf(entry, "%llu", (unsigned long long) val);
|
H A D | sdap_async_nested_groups.c | 152 struct sysdb_attrs *entry = NULL; local 173 entry = talloc_get_type(values[i].ptr, struct sysdb_attrs); 174 entries[i] = talloc_steal(entries, entry); 238 struct sysdb_attrs *entry, 244 ret = sysdb_attrs_get_string(entry, SYSDB_ORIG_DN, &name); 249 return sdap_nested_group_hash_insert(table, name, entry, false, table_name); 417 DEBUG(SSSDBG_OP_FAILURE, "More than one entry found?\n"); 1483 struct sysdb_attrs *entry = NULL; local 1494 &entry, &type); 1499 if (entry ! 237 sdap_nested_group_hash_entry(hash_table_t *table, struct sysdb_attrs *entry, const char *table_name) argument 2029 struct sysdb_attrs *entry; member in struct:sdap_nested_group_lookup_unknown_state 2093 struct sysdb_attrs *entry = NULL; local 2143 struct sysdb_attrs *entry = NULL; local [all...] |
/sssd/src/providers/proxy/ |
H A D | proxy_auth.c | 671 struct hash_entry_t *entry; local 680 while ((entry = iter->next(iter)) != NULL) { 681 req = talloc_get_type(entry->value.ptr, struct tevent_req); 689 if (!entry) {
|
/sssd/src/tools/sssctl/ |
H A D | sssctl_cache.c | 34 #define SSSCTL_CACHE_CREATE {_("Cache entry creation date"), SYSDB_CREATE_TIME, attr_time} 35 #define SSSCTL_CACHE_UPDATE {_("Cache entry last update time"), SYSDB_LAST_UPDATE, attr_time} 36 #define SSSCTL_CACHE_EXPIRE {_("Cache entry expiration time"), SYSDB_CACHE_EXPIRE, attr_expire} 47 struct sysdb_attrs *entry, 91 struct sysdb_attrs *entry, 101 ret = sysdb_attrs_get_string(entry, attr, &orig_name); 127 struct sysdb_attrs *entry, 135 ret = sysdb_attrs_get_uint32_t(entry, attr, &value); 144 struct sysdb_attrs *entry, 152 ret = sysdb_attrs_get_uint32_t(entry, att 90 attr_name(TALLOC_CTX *mem_ctx, struct sysdb_attrs *entry, struct sss_domain_info *dom, const char *attr, const char **_value) argument 126 attr_time(TALLOC_CTX *mem_ctx, struct sysdb_attrs *entry, struct sss_domain_info *dom, const char *attr, const char **_value) argument 143 attr_expire(TALLOC_CTX *mem_ctx, struct sysdb_attrs *entry, struct sss_domain_info *dom, const char *attr, const char **_value) argument 165 attr_initgr(TALLOC_CTX *mem_ctx, struct sysdb_attrs *entry, struct sss_domain_info *dom, const char *attr, const char **_value) argument 190 attr_yesno(TALLOC_CTX *mem_ctx, struct sysdb_attrs *entry, struct sss_domain_info *dom, const char *attr, const char **_value) argument 350 struct sysdb_attrs *entry; local 427 struct sysdb_attrs *entry; local 481 struct sysdb_attrs *entry = NULL; local [all...] |
/sssd/src/confdb/ |
H A D | confdb.c | 680 const char *entry, 689 if (!msg || !entry) { 693 tmp = ldb_msg_find_attr_as_string(msg, entry, NULL); 719 const char *entry, 726 if (!msg || !entry) { 730 tmp = ldb_msg_find_attr_as_string(msg, entry, NULL); 861 "Unable to get memory cache entry timeout.\n"); 874 "Invalid configuration entry, fatal error!\n"); 1071 /* Get the global entry cache timeout setting */ 1095 "memory cache entry expire 678 get_entry_as_uint32(struct ldb_message *msg, uint32_t *return_value, const char *entry, uint32_t default_value) argument 717 get_entry_as_bool(struct ldb_message *msg, bool *return_value, const char *entry, bool default_value) argument [all...] |
/sssd/src/providers/ipa/ |
H A D | ipa_netgroups.c | 679 static bool extract_netgroups(hash_entry_t *entry, void *pvt) argument 684 state->netgroups[state->netgroups_count] = talloc_get_type(entry->value.ptr, 699 static bool extract_entities(hash_entry_t *entry, void *pvt) argument 708 member = talloc_get_type(entry->value.ptr, struct sysdb_attrs);
|
H A D | ipa_subdomains_ext_groups.c | 186 hash_entry_t *entry; local 243 while ((entry = iter->next(iter)) != NULL) { 244 ret = hash_enter(group_hash, &entry->key, &entry->value); 247 entry->key.str); 280 while ((entry = iter->next(iter)) != NULL) { 281 groups[c] = talloc_strdup(groups, entry->key.str);
|
/sssd/src/responder/autofs/ |
H A D | autofssrv_cmd.c | 183 /* Add this entry to the hash table */ 191 "Unable to add hash table entry for [%s]\n", key.str); 321 /* Notify the caller that this entry wasn't found */ 681 DEBUG(SSSDBG_CRIT_FAILURE, "Autofs map entry was lost!\n"); 783 DEBUG(SSSDBG_TRACE_FUNC, "Cached entry is valid, returning..\n"); 918 fill_autofs_entry(struct ldb_message *entry, struct sss_packet *packet, size_t *rp); 1077 struct ldb_message *entry; local 1117 entry = map->entries[cursor]; 1120 ret = fill_autofs_entry(entry, pctx->creq->out, &rp); 1123 "Cannot fill entry 1145 fill_autofs_entry(struct ldb_message *entry, struct sss_packet *packet, size_t *rp) argument [all...] |
/sssd/src/db/ |
H A D | sysdb_upgrade.c | 244 /* ok now we are ready to modify the entry */ 494 DEBUG(SSSDBG_FATAL_FAILURE, "WARNING: Could not add entry %s," 503 "WARNING: Could not remove entry %s," 515 DEBUG(SSSDBG_TRACE_ALL, "WARNING: Could not remove entry %s," 522 DEBUG(SSSDBG_TRACE_ALL, "WARNING: Could not remove entry %s," 529 DEBUG(SSSDBG_TRACE_ALL, "WARNING: Could not remove entry %s," 1121 DEBUG(SSSDBG_TRACE_FUNC, "Adding ghost [%s] to entry [%s]\n", 1191 struct ldb_message *entry; local 1232 entry = res->msgs[i]; 1233 key = ldb_msg_find_attr_as_string(entry, [all...] |
H A D | sysdb_ops.c | 354 DEBUG(SSSDBG_TRACE_FUNC, "No such entry\n"); 447 DEBUG(SSSDBG_TRACE_FUNC, "No such entry\n"); 511 DEBUG(SSSDBG_TRACE_FUNC, "No such entry\n"); 613 DEBUG(SSSDBG_TRACE_FUNC, "No entry with upn [%s] found.\n", upn); 686 DEBUG(SSSDBG_TRACE_FUNC, "No such entry\n"); 746 DEBUG(SSSDBG_TRACE_FUNC, "No such entry\n"); 759 * the entry had changed and the caller needs to update the sysdb cache as well. 763 struct sysdb_attrs *entry) 780 /* Check if the entry is in the timestamp cache */ 791 "Cannot find TS cache entry fo 761 sysdb_check_ts_cache(struct sss_domain_info *domain, struct ldb_dn *entry_dn, struct sysdb_attrs *entry) argument [all...] |
/sssd/src/tests/cmocka/ |
H A D | test_sdap.c | 31 /* mock an LDAP entry */ 54 void set_entry_parse(struct mock_ldap_entry *entry) argument 56 will_return_always(mock_ldap_entry_get, entry); 60 struct mock_ldap_entry *entry) 70 dref->derefVal.bv_val = talloc_strdup(dref, entry->dn); 72 dref->derefVal.bv_len = strlen(entry->dn); 74 if (entry->attrs == NULL) { 79 for (nattr = 0; entry->attrs[nattr].name; nattr++) { 83 dval->type = talloc_strdup(dval, entry->attrs[nattr].name); 86 for (nval = 0; entry 59 mock_deref_res(TALLOC_CTX *mem_ctx, struct mock_ldap_entry *entry) argument 117 __wrap_ldap_get_dn(LDAP *ld, LDAPMessage *entry) argument 128 __wrap_ldap_get_values_len(LDAP *ld, LDAPMessage *entry, LDAP_CONST char *target) argument 184 __wrap_ldap_first_attribute(LDAP *ld, LDAPMessage *entry, BerElement **berout) argument 197 __wrap_ldap_next_attribute(LDAP *ld, LDAPMessage *entry, BerElement *ber) argument [all...] |
/sssd/src/ldb_modules/ |
H A D | memberof.c | 70 struct ldb_message *entry; member in struct:mbof_add_operation 100 struct ldb_message *entry; member in struct:mbof_del_ancestors_ctx 112 struct ldb_message *entry; member in struct:mbof_del_operation 157 struct ldb_message *entry; member in struct:mbof_mod_ctx 196 static int entry_has_objectclass(struct ldb_message *entry, argument 203 el = ldb_msg_find_element(entry, DB_OC); 218 static int entry_is_user_object(struct ldb_message *entry) argument 220 return entry_has_objectclass(entry, DB_USER_CLASS); 223 static int entry_is_group_object(struct ldb_message *entry) argument 225 return entry_has_objectclass(entry, DB_GROUP_CLAS 388 mbof_add_fill_ghop_ex(struct mbof_add_ctx *add_ctx, struct ldb_message *entry, struct mbof_dn_array *parents, struct ldb_val *ghvals, unsigned int num_gh_vals) argument 964 mbof_add_fill_ghop(struct mbof_add_ctx *add_ctx, struct ldb_message *entry, struct mbof_dn_array *parents) argument 2435 mbof_del_fill_muop(struct mbof_del_ctx *del_ctx, struct ldb_message *entry) argument 2497 mbof_del_fill_ghop_ex(struct mbof_del_ctx *del_ctx, struct ldb_message *entry, struct ldb_val *ghvals, unsigned int num_gh_vals) argument 2566 mbof_del_fill_ghop(struct mbof_del_ctx *del_ctx, struct ldb_message *entry) argument 3423 mbof_mod_process_membel(TALLOC_CTX *mem_ctx, struct ldb_context *ldb, struct ldb_message *entry, const struct ldb_message_element *membel, struct mbof_dn_array **_added, struct mbof_dn_array **_removed) argument 3522 mbof_mod_process_ghel(TALLOC_CTX *mem_ctx, struct ldb_message *entry, const struct ldb_message_element *ghel, const struct ldb_message_element *inherited, struct mbof_val_array **_added, struct mbof_val_array **_removed) argument [all...] |