Searched defs:host (Results 1 - 16 of 16) sorted by relevance

/sssd/src/providers/
H A Dfail_over_srv.h32 char *host; member in struct:fo_server_info
/sssd/src/sss_client/
H A Dnss_compat.h44 const char *host; member in struct:__netgrent::__anon31::__anon32
/sssd/src/db/
H A Dsysdb_ssh.c45 "Error storing host %s [%d]: %s\n", name, ret, strerror(ret));
65 struct ldb_message *host = NULL; local
69 DEBUG(SSSDBG_TRACE_FUNC, "Storing host %s\n", name);
84 ret = sysdb_get_ssh_host(tmp_ctx, domain, name, search_attrs, &host);
107 if (host) {
108 el = ldb_msg_find_element(host, SYSDB_NAME_ALIAS);
140 /* make sure sshPublicKey is present when modifying an existing host */
141 if (host) {
234 "Updating known_hosts expire time of host %s\n", name);
273 DEBUG(SSSDBG_TRACE_FUNC, "Deleting host
321 sysdb_get_ssh_host(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *name, const char **attrs, struct ldb_message **host) argument
[all...]
H A Dsysdb_search.c1642 char *host = NULL; local
1681 /* Copy the host string */
1682 host = talloc_strndup(tmp_ctx, p_host, len);
1683 if (!host) {
1745 if (host) {
1746 *hostname = talloc_steal(mem_ctx, host);
/sssd/src/sss_client/ssh/
H A Dsss_ssh_knownhostsproxy.c194 _("The port to use to connect to the host"), NULL },
204 const char *host = NULL; local
271 host = ai[0].ai_canonname;
280 host = canonhost;
284 if (host) {
287 host, pc_domain, pc_host, &ent);
/sssd/src/util/
H A Dsss_selinux.c52 struct sysdb_attrs *host,
73 /* Search for user and host related elements */
135 if (host) {
136 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_DN, &dn);
141 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_MEMBEROF, &memberof);
150 * The rule won't match if host category != "all" and user map doesn't
151 * contain neither host nor any of its groups in memberHost attribute
50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
H A Dutil.c764 bool is_host_in_domain(const char *host, const char *domain) argument
766 int diff = strlen(host) - strlen(domain);
768 if (diff == 0 && strcmp(host, domain) == 0) {
772 if (diff > 0 && strcmp(host + diff, domain) == 0 && host[diff - 1] == '.') {
/sssd/src/tests/
H A Dsysdb_ssh-tests.c165 struct ldb_message *host; member in struct:test_data
197 attrs, &data->host);
239 fail_if(ret != EOK, "Could not store host into database");
273 fail_if(ret != EOK, "Could not delete host from database");
308 fail_if(ret != EOK, "Deletion of nonexistent host returned code %d", ret);
351 fail("Could not store host '%s' to database", TEST_HOSTNAME);
358 fail_if(ret != EOK, "Could not find host '%s'",TEST_HOSTNAME);
H A Dutil-tests.c990 const char *host; member in struct:__anon47
1005 for (i = 0; data[i].host != NULL; i++) {
1006 ret = is_host_in_domain(data[i].host, data[i].domain);
1008 "Got: %d\n", data[i].host, data[i].domain,
/sssd/src/responder/secrets/
H A Dsecsrv_private.h62 char *host; member in struct:sec_url
/sssd/src/providers/ipa/
H A Dipa_hbac_common.c465 /* Get the source host */
470 * source host.
481 /* The target host is always the current machine */
715 struct hbac_request_element *host; local
725 host = talloc_zero(tmp_ctx, struct hbac_request_element);
726 if (host == NULL) {
731 host->name = hostname;
733 if (host->name == NULL) {
734 /* We don't know the host (probably an rhost)
737 ret = create_empty_grouplist(host);
[all...]
H A Dipa_sudo_async.c78 struct ipa_hostinfo *host,
105 for (i = 0; i < host->num_hosts; i++) {
106 filter = ipa_sudo_filter_append_origdn(filter, host->hosts[i],
114 for (i = 0; i < host->num_hostgroups; i++) {
115 filter = ipa_sudo_filter_append_origdn(filter, host->hostgroups[i],
369 struct ipa_hostinfo *host; member in struct:ipa_sudo_fetch_state
400 struct ipa_hostinfo *host,
424 state->host = host;
564 host_filter = ipa_sudo_host_filter(state, state->host, ma
77 ipa_sudo_host_filter(TALLOC_CTX *mem_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map) argument
396 ipa_sudo_fetch_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sss_domain_info *domain, struct ipa_sudo_ctx *sudo_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map_user, struct sdap_attr_map *map_group, struct sdap_attr_map *map_host, struct sdap_attr_map *map_hostgroup, struct sdap_handle *sh, const char *cmdgroups_filter, const char *search_filter) argument
997 struct ipa_hostinfo *host; local
[all...]
H A Dipa_selinux.c60 struct sysdb_attrs *host,
79 struct sysdb_attrs *host,
146 struct sysdb_attrs *host,
157 struct sysdb_attrs *host,
194 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) {
228 ret = ipa_selinux_process_seealso_maps(user, host,
246 struct sysdb_attrs *host,
283 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) {
839 struct sysdb_attrs *host; member in struct:ipa_get_selinux_state
857 struct sysdb_attrs *host,
155 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument
245 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **seealso_rules, size_t seealso_rules_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, uint32_t top_priority, struct sysdb_attrs **usermaps, size_t best_match_maps_cnt) argument
854 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument
1088 struct sysdb_attrs **host; local
1334 struct sysdb_attrs *host = NULL; local
1445 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument
1510 struct sysdb_attrs *host; member in struct:ipa_selinux_handler_state
[all...]
/sssd/src/tests/cmocka/
H A Dtest_sysdb_sudo.c53 const char *host; member in struct:test_rule
95 rules[i].host);
116 rules[0].host);
226 assert_string_equal(result, rules[0].host);
284 assert_string_equal(result, rules[0].host);
357 assert_string_equal(result, rules[0].host);
622 rules[0].host);
/sssd/src/providers/ldap/
H A Dsdap_access.c1244 char *host; local
1269 host = (char *)el->values[i].data;
1270 if (host[0] == '!' &&
1271 strcasecmp(hostname, host+1) == 0) {
1272 /* This host is explicitly denied */
1273 DEBUG(SSSDBG_CONF_SETTINGS, "Access denied by [%s]\n", host);
1277 } else if (strcasecmp(hostname, host) == 0) {
1278 /* This host is explicitly allowed */
1279 DEBUG(SSSDBG_CONF_SETTINGS, "Access granted for [%s]\n", host);
1284 } else if (strcmp("*", host)
[all...]
H A Dsdap_async_connection.c265 /* Set host name canonicalization for LDAP SASL bind */
437 char *host; member in struct:sdap_connect_host_state
454 const char *host,
481 state->host = talloc_strdup(state, host);
482 if (state->host == NULL) {
487 state->uri = talloc_asprintf(state, "%s://%s:%d", protocol, host, port);
493 DEBUG(SSSDBG_TRACE_FUNC, "Resolving host %s\n", host);
496 host, family_orde
447 sdap_connect_host_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_options *opts, struct resolv_ctx *resolv_ctx, enum restrict_family family_order, enum host_database *host_db, const char *protocol, const char *host, int port, bool use_start_tls) argument
[all...]

Completed in 4207 milliseconds