/sssd/src/providers/ |
H A D | fail_over_srv.h | 32 char *host; member in struct:fo_server_info
|
/sssd/src/sss_client/ |
H A D | nss_compat.h | 44 const char *host; member in struct:__netgrent::__anon31::__anon32
|
/sssd/src/db/ |
H A D | sysdb_ssh.c | 45 "Error storing host %s [%d]: %s\n", name, ret, strerror(ret)); 65 struct ldb_message *host = NULL; local 69 DEBUG(SSSDBG_TRACE_FUNC, "Storing host %s\n", name); 84 ret = sysdb_get_ssh_host(tmp_ctx, domain, name, search_attrs, &host); 107 if (host) { 108 el = ldb_msg_find_element(host, SYSDB_NAME_ALIAS); 140 /* make sure sshPublicKey is present when modifying an existing host */ 141 if (host) { 234 "Updating known_hosts expire time of host %s\n", name); 273 DEBUG(SSSDBG_TRACE_FUNC, "Deleting host 321 sysdb_get_ssh_host(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *name, const char **attrs, struct ldb_message **host) argument [all...] |
H A D | sysdb_search.c | 1642 char *host = NULL; local 1681 /* Copy the host string */ 1682 host = talloc_strndup(tmp_ctx, p_host, len); 1683 if (!host) { 1745 if (host) { 1746 *hostname = talloc_steal(mem_ctx, host);
|
/sssd/src/sss_client/ssh/ |
H A D | sss_ssh_knownhostsproxy.c | 194 _("The port to use to connect to the host"), NULL }, 204 const char *host = NULL; local 271 host = ai[0].ai_canonname; 280 host = canonhost; 284 if (host) { 287 host, pc_domain, pc_host, &ent);
|
/sssd/src/util/ |
H A D | sss_selinux.c | 52 struct sysdb_attrs *host, 73 /* Search for user and host related elements */ 135 if (host) { 136 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_DN, &dn); 141 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_MEMBEROF, &memberof); 150 * The rule won't match if host category != "all" and user map doesn't 151 * contain neither host nor any of its groups in memberHost attribute 50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
|
H A D | util.c | 764 bool is_host_in_domain(const char *host, const char *domain) argument 766 int diff = strlen(host) - strlen(domain); 768 if (diff == 0 && strcmp(host, domain) == 0) { 772 if (diff > 0 && strcmp(host + diff, domain) == 0 && host[diff - 1] == '.') {
|
/sssd/src/tests/ |
H A D | sysdb_ssh-tests.c | 165 struct ldb_message *host; member in struct:test_data 197 attrs, &data->host); 239 fail_if(ret != EOK, "Could not store host into database"); 273 fail_if(ret != EOK, "Could not delete host from database"); 308 fail_if(ret != EOK, "Deletion of nonexistent host returned code %d", ret); 351 fail("Could not store host '%s' to database", TEST_HOSTNAME); 358 fail_if(ret != EOK, "Could not find host '%s'",TEST_HOSTNAME);
|
H A D | util-tests.c | 990 const char *host; member in struct:__anon47 1005 for (i = 0; data[i].host != NULL; i++) { 1006 ret = is_host_in_domain(data[i].host, data[i].domain); 1008 "Got: %d\n", data[i].host, data[i].domain,
|
/sssd/src/responder/secrets/ |
H A D | secsrv_private.h | 62 char *host; member in struct:sec_url
|
/sssd/src/providers/ipa/ |
H A D | ipa_hbac_common.c | 465 /* Get the source host */ 470 * source host. 481 /* The target host is always the current machine */ 715 struct hbac_request_element *host; local 725 host = talloc_zero(tmp_ctx, struct hbac_request_element); 726 if (host == NULL) { 731 host->name = hostname; 733 if (host->name == NULL) { 734 /* We don't know the host (probably an rhost) 737 ret = create_empty_grouplist(host); [all...] |
H A D | ipa_sudo_async.c | 78 struct ipa_hostinfo *host, 105 for (i = 0; i < host->num_hosts; i++) { 106 filter = ipa_sudo_filter_append_origdn(filter, host->hosts[i], 114 for (i = 0; i < host->num_hostgroups; i++) { 115 filter = ipa_sudo_filter_append_origdn(filter, host->hostgroups[i], 369 struct ipa_hostinfo *host; member in struct:ipa_sudo_fetch_state 400 struct ipa_hostinfo *host, 424 state->host = host; 564 host_filter = ipa_sudo_host_filter(state, state->host, ma 77 ipa_sudo_host_filter(TALLOC_CTX *mem_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map) argument 396 ipa_sudo_fetch_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sss_domain_info *domain, struct ipa_sudo_ctx *sudo_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map_user, struct sdap_attr_map *map_group, struct sdap_attr_map *map_host, struct sdap_attr_map *map_hostgroup, struct sdap_handle *sh, const char *cmdgroups_filter, const char *search_filter) argument 997 struct ipa_hostinfo *host; local [all...] |
H A D | ipa_selinux.c | 60 struct sysdb_attrs *host, 79 struct sysdb_attrs *host, 146 struct sysdb_attrs *host, 157 struct sysdb_attrs *host, 194 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) { 228 ret = ipa_selinux_process_seealso_maps(user, host, 246 struct sysdb_attrs *host, 283 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) { 839 struct sysdb_attrs *host; member in struct:ipa_get_selinux_state 857 struct sysdb_attrs *host, 155 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument 245 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **seealso_rules, size_t seealso_rules_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, uint32_t top_priority, struct sysdb_attrs **usermaps, size_t best_match_maps_cnt) argument 854 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument 1088 struct sysdb_attrs **host; local 1334 struct sysdb_attrs *host = NULL; local 1445 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument 1510 struct sysdb_attrs *host; member in struct:ipa_selinux_handler_state [all...] |
/sssd/src/tests/cmocka/ |
H A D | test_sysdb_sudo.c | 53 const char *host; member in struct:test_rule 95 rules[i].host); 116 rules[0].host); 226 assert_string_equal(result, rules[0].host); 284 assert_string_equal(result, rules[0].host); 357 assert_string_equal(result, rules[0].host); 622 rules[0].host);
|
/sssd/src/providers/ldap/ |
H A D | sdap_access.c | 1244 char *host; local 1269 host = (char *)el->values[i].data; 1270 if (host[0] == '!' && 1271 strcasecmp(hostname, host+1) == 0) { 1272 /* This host is explicitly denied */ 1273 DEBUG(SSSDBG_CONF_SETTINGS, "Access denied by [%s]\n", host); 1277 } else if (strcasecmp(hostname, host) == 0) { 1278 /* This host is explicitly allowed */ 1279 DEBUG(SSSDBG_CONF_SETTINGS, "Access granted for [%s]\n", host); 1284 } else if (strcmp("*", host) [all...] |
H A D | sdap_async_connection.c | 265 /* Set host name canonicalization for LDAP SASL bind */ 437 char *host; member in struct:sdap_connect_host_state 454 const char *host, 481 state->host = talloc_strdup(state, host); 482 if (state->host == NULL) { 487 state->uri = talloc_asprintf(state, "%s://%s:%d", protocol, host, port); 493 DEBUG(SSSDBG_TRACE_FUNC, "Resolving host %s\n", host); 496 host, family_orde 447 sdap_connect_host_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_options *opts, struct resolv_ctx *resolv_ctx, enum restrict_family family_order, enum host_database *host_db, const char *protocol, const char *host, int port, bool use_start_tls) argument [all...] |