/sssd-io/src/providers/ |
H A D | fail_over_srv.h | 32 char *host; member in struct:fo_server_info
|
/sssd-io/src/sss_client/ |
H A D | nss_compat.h | 44 const char *host; member in struct:__netgrent::__anon41::__anon42
|
/sssd-io/src/responder/nss/ |
H A D | nss_protocol_netgr.c | 30 struct sized_string host; local 37 to_sized_string(&host, entry->value.triple.hostname); 41 if (host.len == 0) { 42 host.len = 1; 43 host.str = ""; 57 + host.len + user.len + domain.len); 66 SAFEALIGN_SET_STRING(&body[*_rp], host.str, host.len, _rp);
|
/sssd-io/src/db/ |
H A D | sysdb_ssh.c | 45 "Error storing host %s [%d]: %s\n", name, ret, strerror(ret)); 65 struct ldb_message *host = NULL; local 69 DEBUG(SSSDBG_TRACE_FUNC, "Storing host %s\n", name); 84 ret = sysdb_get_ssh_host(tmp_ctx, domain, name, search_attrs, &host); 107 if (host) { 108 el = ldb_msg_find_element(host, SYSDB_NAME_ALIAS); 140 /* make sure sshPublicKey is present when modifying an existing host */ 141 if (host) { 234 "Updating known_hosts expire time of host %s\n", name); 273 DEBUG(SSSDBG_TRACE_FUNC, "Deleting host 321 sysdb_get_ssh_host(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *name, const char **attrs, struct ldb_message **host) argument [all...] |
H A D | sysdb_search.c | 1710 char *host = NULL; local 1749 /* Copy the host string */ 1750 host = talloc_strndup(tmp_ctx, p_host, len); 1751 if (!host) { 1813 if (host) { 1814 *hostname = talloc_steal(mem_ctx, host);
|
/sssd-io/src/sss_client/ssh/ |
H A D | sss_ssh_knownhostsproxy.c | 205 _("The port to use to connect to the host"), NULL }, 215 const char *host = NULL; local 282 host = ai->ai_canonname; 291 host = canonhost; 295 if (host) { 298 host, pc_domain, pc_host, &ent);
|
/sssd-io/src/tests/python/sssd/testlib/common/ |
H A D | qe_class.py | 3 import pytest_multihost.host namespace 57 class QeBaseHost(pytest_multihost.host.BaseHost): 63 """QeHost subclass of multihost plugin host class. 65 This extends functionality of the host class for SSSD QE purposes. 183 class QeWinHost(QeBaseHost, pytest_multihost.host.WinHost): 186 Subclass of pytest_multihost.host.WinHost, QeBaseHost
|
/sssd-io/src/tests/ |
H A D | sysdb_ssh-tests.c | 165 struct ldb_message *host; member in struct:test_data 197 attrs, &data->host); 239 fail_if(ret != EOK, "Could not store host into database"); 273 fail_if(ret != EOK, "Could not delete host from database"); 308 fail_if(ret != EOK, "Deletion of nonexistent host returned code %d", ret); 351 fail("Could not store host '%s' to database", TEST_HOSTNAME); 358 fail_if(ret != EOK, "Could not find host '%s'",TEST_HOSTNAME);
|
H A D | util-tests.c | 1009 const char *host; member in struct:__anon58 1024 for (i = 0; data[i].host != NULL; i++) { 1025 ret = is_host_in_domain(data[i].host, data[i].domain); 1027 "Got: %d\n", data[i].host, data[i].domain,
|
/sssd-io/src/util/ |
H A D | sss_selinux.c | 52 struct sysdb_attrs *host, 73 /* Search for user and host related elements */ 135 if (host) { 136 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_DN, &dn); 141 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_MEMBEROF, &memberof); 150 * The rule won't match if host category != "all" and user map doesn't 151 * contain neither host nor any of its groups in memberHost attribute 50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
|
H A D | tev_curl.c | 1041 long host = verify_host ? 2L : 0L; local 1048 ret = tcurl_set_option(tcurl_req, CURLOPT_SSL_VERIFYHOST, host);
|
H A D | util.c | 665 bool is_host_in_domain(const char *host, const char *domain) argument 667 int diff = strlen(host) - strlen(domain); 669 if (diff == 0 && strcmp(host, domain) == 0) { 673 if (diff > 0 && strcmp(host + diff, domain) == 0 && host[diff - 1] == '.') {
|
/sssd-io/src/providers/ipa/ |
H A D | ipa_hbac_common.c | 332 /* Get the source host */ 337 * source host. 348 /* The target host is always the current machine */ 619 struct hbac_request_element *host; local 629 host = talloc_zero(tmp_ctx, struct hbac_request_element); 630 if (host == NULL) { 635 host->name = hostname; 637 if (host->name == NULL) { 638 /* We don't know the host (probably an rhost) 641 ret = create_empty_grouplist(host); [all...] |
H A D | ipa_deskprofile_rules_util.c | 52 * 1 = user, group, host, hostgroup 53 * 2 = user, group, hostgroup, host 54 * 3 = user, host, group, hostgroup 55 * 4 = user, host, hostgroup, group 56 * 5 = user, hostgroup, group, host 57 * 6 = user, hostgroup, host, group 58 * 7 = group, user, host, hostgroup 59 * 8 = group, user, hostgroup, host 60 * 9 = group, host, user, hostgroup 61 * 10 = group, host, hostgrou 532 bool host = false; local [all...] |
H A D | ipa_sudo_async.c | 78 struct ipa_hostinfo *host, 105 for (i = 0; i < host->num_hosts; i++) { 106 filter = ipa_sudo_filter_append_origdn(filter, host->hosts[i], 114 for (i = 0; i < host->num_hostgroups; i++) { 115 filter = ipa_sudo_filter_append_origdn(filter, host->hostgroups[i], 369 struct ipa_hostinfo *host; member in struct:ipa_sudo_fetch_state 401 struct ipa_hostinfo *host, 425 state->host = host; 566 host_filter = ipa_sudo_host_filter(state, state->host, ma 77 ipa_sudo_host_filter(TALLOC_CTX *mem_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map) argument 397 ipa_sudo_fetch_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sss_domain_info *domain, struct ipa_sudo_ctx *sudo_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map_user, struct sdap_attr_map *map_group, struct sdap_attr_map *map_host, struct sdap_attr_map *map_hostgroup, struct sdap_handle *sh, const char *cmdgroups_filter, const char *search_filter) argument 1002 struct ipa_hostinfo *host; local [all...] |
H A D | ipa_selinux.c | 61 struct sysdb_attrs *host, 80 struct sysdb_attrs *host, 147 struct sysdb_attrs *host, 158 struct sysdb_attrs *host, 195 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) { 229 ret = ipa_selinux_process_seealso_maps(user, host, 247 struct sysdb_attrs *host, 284 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) { 840 struct sysdb_attrs *host; member in struct:ipa_get_selinux_state 858 struct sysdb_attrs *host, 156 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument 246 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **seealso_rules, size_t seealso_rules_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, uint32_t top_priority, struct sysdb_attrs **usermaps, size_t best_match_maps_cnt) argument 855 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument 1100 struct sysdb_attrs **host; local 1354 struct sysdb_attrs *host = NULL; local 1465 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument 1530 struct sysdb_attrs *host; member in struct:ipa_selinux_handler_state [all...] |
/sssd-io/src/responder/secrets/ |
H A D | secsrv_private.h | 63 char *host; member in struct:sec_url
|
/sssd-io/src/tests/cmocka/ |
H A D | test_sysdb_sudo.c | 57 const char *host; member in struct:test_rule 99 rules[i].host); 120 rules[0].host); 276 assert_string_equal(result, rules[0].host); 334 assert_string_equal(result, rules[0].host); 412 assert_string_equal(result, rules[0].host); 779 rules[0].host);
|
/sssd-io/src/providers/ldap/ |
H A D | sdap_access.c | 1249 char *host; local 1274 host = (char *)el->values[i].data; 1275 if (host[0] == '!' && 1276 strcasecmp(hostname, host+1) == 0) { 1277 /* This host is explicitly denied */ 1278 DEBUG(SSSDBG_CONF_SETTINGS, "Access denied by [%s]\n", host); 1282 } else if (strcasecmp(hostname, host) == 0) { 1283 /* This host is explicitly allowed */ 1284 DEBUG(SSSDBG_CONF_SETTINGS, "Access granted for [%s]\n", host); 1289 } else if (strcmp("*", host) [all...] |
H A D | sdap_async_connection.c | 265 /* Set host name canonicalization for LDAP SASL bind */ 437 char *host; member in struct:sdap_connect_host_state 454 const char *host, 481 state->host = talloc_strdup(state, host); 482 if (state->host == NULL) { 487 state->uri = talloc_asprintf(state, "%s://%s:%d", protocol, host, port); 493 DEBUG(SSSDBG_TRACE_FUNC, "Resolving host %s\n", host); 496 host, family_orde 447 sdap_connect_host_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_options *opts, struct resolv_ctx *resolv_ctx, enum restrict_family family_order, enum host_database *host_db, const char *protocol, const char *host, int port, bool use_start_tls) argument [all...] |