Searched defs:realm (Results 1 - 25 of 27) sorted by relevance

12

/sssd/src/providers/krb5/
H A Dkrb5_init.c38 const char *realm; local
45 realm = dp_opt_get_string(ctx->opts, KRB5_REALM);
46 if (realm == NULL) {
69 primary_servers, backup_servers, realm,
85 const char *realm; local
89 realm = dp_opt_get_string(ctx->opts, KRB5_REALM);
90 if (realm == NULL) {
101 primary_servers, backup_servers, realm,
H A Dkrb5_auth.c434 const char *realm; local
571 realm = dp_opt_get_cstring(krb5_ctx->opts, KRB5_REALM);
572 if (realm == NULL) {
573 DEBUG(SSSDBG_CRIT_FAILURE, "Missing Kerberos realm.\n");
594 ret = compare_principal_realm(kr->upn, realm,
H A Dkrb5_ccache.c474 const char *realm, const char *principal)
507 tgt_name = talloc_asprintf(tmp_ctx, "krbtgt/%s@%s", realm, realm);
473 sss_krb5_cc_verify_ccache(const char *ccname, uid_t uid, gid_t gid, const char *realm, const char *principal) argument
H A Dkrb5_common.h71 char *realm; member in struct:krb5_service
134 char *realm; member in struct:krb5_ctx
143 char *realm; member in struct:remove_info_files_ctx
159 errno_t write_krb5info_file(const char *realm, const char *kdc,
166 const char *realm,
185 errno_t remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm);
191 errno_t compare_principal_realm(const char *upn, const char *realm,
H A Dkrb5_common.c169 const char *realm; local
183 realm = dp_opt_get_cstring(opts, KRB5_REALM);
184 if (realm == NULL) {
190 realm = dom->name;
193 krb5_ctx->realm = talloc_strdup(krb5_ctx, realm);
194 if (krb5_ctx->realm == NULL) {
196 "Failed to set realm, krb5_child might not work as expected.\n");
391 errno_t write_krb5info_file(const char *realm, const char *server, argument
403 if (realm
721 krb5_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx, const char *service_name, const char *primary_servers, const char *backup_servers, const char *realm, bool use_kdcinfo, struct krb5_service **_service) argument
801 remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm) argument
888 char *realm = (char *)private_data; local
993 const char *realm = NULL; local
1051 compare_principal_realm(const char *upn, const char *realm, bool *different_realm) argument
[all...]
/sssd/src/providers/ipa/
H A Dipa_subdomains.h101 const char *realm; member in struct:ipa_server_mode_ctx
H A Dipa_auth.c232 char *realm; local
253 realm = dp_opt_get_string(state->auth_ctx->ipa_options, IPA_KRB5_REALM);
256 realm);
H A Dipa_common.c49 char *realm; local
97 /* First check whether the realm has been manually specified */
98 realm = dp_opt_get_string(opts->basic, IPA_KRB5_REALM);
99 if (!realm) {
101 realm = get_uppercase_realm(opts, domain);
102 if (!realm) {
108 realm);
178 char *realm; local
240 /* set krb realm */
242 realm
930 char *realm; local
[all...]
H A Dipa_id.c215 const char *realm; member in struct:ipa_initgr_get_overrides_state
254 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic,
256 if (state->realm == NULL) {
257 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n");
338 state->realm,
482 const char *realm; member in struct:ipa_id_get_account_info_state
541 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic,
543 if (state->realm == NULL) {
544 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n");
601 state->ipa_ctx->ipa_options, state->realm,
[all...]
H A Dipa_subdomains_server.c172 forest_realm = subdom->forest_root->realm;
177 id_ctx->server_mode->realm,
266 /* Set KRB5 realm to same as the one of IPA when IPA
269 id_ctx->server_mode->realm,
623 state->forest_realm = subdom->forest_root->realm;
625 DB_PATH, subdom->parent->realm);
1053 char *realm; local
1079 realm = dp_opt_get_string(id_ctx->ipa_options->basic, IPA_KRB5_REALM);
1080 if (realm == NULL) {
1081 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm fo
[all...]
H A Dipa_subdomains.c385 char *realm; local
406 realm = get_uppercase_realm(tmp_ctx, name);
407 if (!realm) {
457 ret = sysdb_subdomain_store(parent->sysdb, name, realm, flat,
849 && domain->realm != NULL) {
887 const char *realm = NULL; local
929 realm = dp_opt_get_string(state->ipa_options->basic, IPA_KRB5_REALM);
930 if (realm == NULL) {
931 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n");
936 ret = sysdb_master_domain_add_info(state->domain, realm, fla
[all...]
/sssd/src/providers/ldap/
H A Dsdap_utils.c236 const char *realm; local
243 realm = dp_opt_get_cstring(sdap_basic_opts, SDAP_KRB5_REALM);
244 if (realm == NULL) {
256 p + 1, realm);
H A Dsdap_dyndns.c50 const char *realm; member in struct:sdap_dyndns_update_state
91 const char *realm,
108 state->realm = realm;
323 const char *realm; local
329 realm = NULL;
332 realm = state->realm;
335 ret = be_nsupdate_create_fwd_msg(state, realm, servername,
464 const char *realm; local
83 sdap_dyndns_update_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct dp_option *opts, struct sdap_id_ctx *sdap_ctx, enum be_nsupdate_auth auth_type, const char *ifname, const char *hostname, const char *realm, const int ttl, bool check_diff) argument
[all...]
H A Dldap_common.c159 char *realm = (char *) private_data; local
162 ret = remove_krb5_info_files(se, realm);
172 const char *realm)
179 sig_realm = talloc_strdup(mem_ctx, realm);
221 ret = remove_krb5_info_files(tmp_ctx, ctx->realm);
232 const char *realm,
245 ctx->realm = talloc_strdup(ctx, realm);
247 if (ctx->realm == NULL || ctx->kdc_service_name == NULL) {
288 /* Configuration of SASL auth ID and realm */
170 sdap_install_sigterm_handler(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *realm) argument
230 sdap_install_offline_callback(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, const char *realm, const char *service_name) argument
361 const char *realm = NULL; local
393 const char *realm; local
[all...]
H A Dsdap_async_connection.c1056 const char *realm; member in struct:sdap_kinit_state
1081 const char *realm,
1092 principal, realm, lifetime);
1104 state->realm = realm;
1174 tgtreq = sdap_get_tgt_send(state, state->ev, state->realm,
1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
/sssd/src/krb5_plugin/
H A Dsssd_krb5_locator_plugin.c83 static int get_krb5info(const char *realm, struct sssd_ctx *ctx, argument
109 len = strlen(realm) + strlen(name_tmpl);
117 ret = snprintf(krb5info_name, len, name_tmpl, realm);
259 const char *realm,
276 if (ctx->sssd_realm == NULL || strcmp(ctx->sssd_realm, realm) != 0) {
278 ctx->sssd_realm = strdup(realm);
284 ret = get_krb5info(realm, ctx, locate_service_kdc);
292 ret = get_krb5info(realm, ctx, locate_service_kpasswd);
303 PLUGIN_DEBUG(("sssd_realm[%s] requested realm[%s] family[%d] socktype[%d] "
304 "locate_service[%d]\n", ctx->sssd_realm, realm, famil
257 sssd_krb5_locator_lookup(void *private_data, enum locate_service_type svc, const char *realm, int socktype, int family, int (*cbfunc)(void *, int, struct sockaddr *), void *cbdata) argument
[all...]
/sssd/src/tests/
H A Dkrb5_child-test.c97 create_dummy_krb5_ctx(TALLOC_CTX *mem_ctx, const char *realm) argument
147 ret = dp_opt_set_string(krb5_ctx->opts, KRB5_REALM, realm);
189 const char *password, const char *realm,
212 kr->krb5_ctx = create_dummy_krb5_ctx(kr, realm);
416 { "realm", 'r', POPT_ARG_STRING, &pc_realm, 0,
417 "The Kerberos realm to use", NULL },
461 DEBUG(SSSDBG_FATAL_FAILURE, "Please specify the realm\n");
188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, const char *password, const char *realm, const char *ccname, const char *ccname_template, int timeout) argument
/sssd/src/db/
H A Dsysdb_subdomains.c29 const char *realm,
79 if (realm != NULL) {
80 dom->realm = talloc_strdup(dom, realm);
81 if (dom->realm == NULL) {
82 DEBUG(SSSDBG_OP_FAILURE, "Failed to copy realm name.\n");
171 if (d->realm && (strcasecmp(d->forest, d->realm) == 0)) {
182 && root->realm != NULL
183 && strcasecmp(member->forest, root->realm)
26 new_subdomain(TALLOC_CTX *mem_ctx, struct sss_domain_info *parent, const char *name, const char *realm, const char *flat_name, const char *id, bool mpg, bool enumerate, const char *forest, uint32_t trust_direction) argument
245 const char *realm; local
664 sysdb_master_domain_add_info(struct sss_domain_info *domain, const char *realm, const char *flat, const char *id, const char *forest, struct ldb_message_element *upn_suffixes) argument
822 sysdb_subdomain_store(struct sysdb_ctx *sysdb, const char *name, const char *realm, const char *flat_name, const char *domain_id, bool mpg, bool enumerate, const char *forest, uint32_t trust_direction, struct ldb_message_element *upn_suffixes) argument
[all...]
/sssd/src/providers/ad/
H A Dad_common.c140 const char *realm,
147 ret = dp_opt_set_string(ad_options->basic, AD_KRB5_REALM, realm);
149 DEBUG(SSSDBG_OP_FAILURE, "Cannot set AD krb5 realm\n");
178 const char *realm,
189 ret = set_common_ad_trust_opts(ad_options, realm, ad_domain, hostname,
213 const char *realm; local
219 realm = get_uppercase_realm(ad_options, ad_domain);
220 if (!realm) {
225 ret = set_common_ad_trust_opts(ad_options, realm,
353 char *realm; local
139 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument
177 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument
[all...]
H A Dad_id.c503 const char *realm; member in struct:ad_enumeration_state
543 state->realm = dp_opt_get_cstring(state->id_ctx->ad_options->basic,
545 if (state->realm == NULL) {
546 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm\n");
633 ret = sysdb_master_domain_add_info(state->sdom->dom, state->realm,
H A Dad_subdomains.c158 const char *realm; local
162 realm = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KRB5_REALM);
166 if (realm == NULL || hostname == NULL || ad_domain == NULL) {
167 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm or hostname.\n");
171 ad_options = ad_create_2way_trust_options(id_ctx, realm, ad_domain,
193 ret = ad_failover_init(ad_options, be_ctx, NULL, NULL, realm,
287 char *realm; local
315 realm = get_uppercase_realm(tmp_ctx, name);
316 if (!realm) {
345 ret = sysdb_subdomain_store(domain->sysdb, name, realm, fla
1232 const char *realm; local
[all...]
/sssd/src/util/
H A Dusertools.c41 /* Function returns given realm name as new uppercase string */
44 char *realm; local
47 realm = talloc_strdup(memctx, name);
48 if (!realm) {
52 c = realm;
58 return realm;
H A Dsss_krb5.c75 char *realm = NULL; local
149 realm = talloc_asprintf(tmp_ctx, realm_patterns[i], desired_realm);
150 if (realm == NULL) {
155 realm = NULL;
158 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm,
161 talloc_zfree(realm);
233 DEBUG(SSSDBG_FUNC_DATA, "Selected realm: %s\n", *_realm);
270 * @param pattern_realm realm part of the principal we want to perform
691 /* omit realm if local realm */
771 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument
785 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument
1077 sss_krb5_realm_has_proxy(const char *realm) argument
[all...]
/sssd/src/providers/
H A Dbe_dyndns.c401 nsupdate_msg_add_realm_cmd(TALLOC_CTX *mem_ctx, const char *realm) argument
404 if (realm != NULL) {
405 return talloc_asprintf(mem_ctx, "realm %s\n", realm);
412 nsupdate_msg_create_common(TALLOC_CTX *mem_ctx, const char *realm, argument
422 realm_directive = nsupdate_msg_add_realm_cmd(tmp_ctx, realm);
432 "Creating update message for server [%s] and realm [%s].\n",
433 servername, realm);
435 /* Add the server, realm and headers */
440 "Creating update message for realm [
459 be_nsupdate_create_fwd_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, uint8_t remove_af, struct sss_iface_addr *addresses, char **_update_msg) argument
504 be_nsupdate_create_ptr_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, struct sockaddr_storage *address, bool delete, char **_update_msg) argument
[all...]
/sssd/src/confdb/
H A Dconfdb.h302 char *realm; member in struct:sss_domain_info

Completed in 983 milliseconds

12