Searched defs:realm (Results 1 - 25 of 29) sorted by relevance

12

/sssd-io/src/providers/krb5/
H A Dkrb5_init.c38 const char *realm; local
45 realm = dp_opt_get_string(ctx->opts, KRB5_REALM);
46 if (realm == NULL) {
69 primary_servers, backup_servers, realm,
85 const char *realm; local
89 realm = dp_opt_get_string(ctx->opts, KRB5_REALM);
90 if (realm == NULL) {
101 primary_servers, backup_servers, realm,
H A Dkrb5_auth.c462 const char *realm; local
601 realm = dp_opt_get_cstring(krb5_ctx->opts, KRB5_REALM);
602 if (realm == NULL) {
603 DEBUG(SSSDBG_CRIT_FAILURE, "Missing Kerberos realm.\n");
624 ret = compare_principal_realm(kr->upn, realm,
H A Dkrb5_ccache.c474 const char *realm, const char *principal)
507 tgt_name = talloc_asprintf(tmp_ctx, "krbtgt/%s@%s", realm, realm);
473 sss_krb5_cc_verify_ccache(const char *ccname, uid_t uid, gid_t gid, const char *realm, const char *principal) argument
H A Dkrb5_common.h71 char *realm; member in struct:krb5_service
135 char *realm; member in struct:krb5_ctx
144 char *realm; member in struct:remove_info_files_ctx
160 errno_t write_krb5info_file(const char *realm, const char *kdc,
167 const char *realm,
186 errno_t remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm);
192 errno_t compare_principal_realm(const char *upn, const char *realm,
H A Dkrb5_common.c170 const char *realm; local
184 realm = dp_opt_get_cstring(opts, KRB5_REALM);
185 if (realm == NULL) {
191 realm = dom->name;
194 krb5_ctx->realm = talloc_strdup(krb5_ctx, realm);
195 if (krb5_ctx->realm == NULL) {
197 "Failed to set realm, krb5_child might not work as expected.\n");
392 errno_t write_krb5info_file(const char *realm, const char *server, argument
404 if (realm
722 krb5_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx, const char *service_name, const char *primary_servers, const char *backup_servers, const char *realm, bool use_kdcinfo, struct krb5_service **_service) argument
802 remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm) argument
889 char *realm = (char *)private_data; local
994 const char *realm = NULL; local
1052 compare_principal_realm(const char *upn, const char *realm, bool *different_realm) argument
[all...]
/sssd-io/src/providers/ipa/
H A Dipa_subdomains.h101 const char *realm; member in struct:ipa_server_mode_ctx
H A Dipa_auth.c240 char *realm; local
262 realm = dp_opt_get_string(state->auth_ctx->ipa_options, IPA_KRB5_REALM);
265 realm);
H A Dipa_common.c49 char *realm; local
97 /* First check whether the realm has been manually specified */
98 realm = dp_opt_get_string(opts->basic, IPA_KRB5_REALM);
99 if (!realm) {
101 realm = get_uppercase_realm(opts, domain);
102 if (!realm) {
108 realm);
179 char *realm; local
242 /* set krb realm */
244 realm
959 char *realm; local
[all...]
H A Dipa_id.c227 const char *realm; member in struct:ipa_initgr_get_overrides_state
266 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic,
268 if (state->realm == NULL) {
269 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n");
350 state->realm,
495 const char *realm; member in struct:ipa_id_get_account_info_state
556 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic,
558 if (state->realm == NULL) {
559 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n");
616 state->ipa_ctx->ipa_options, state->realm,
[all...]
H A Dipa_subdomains_server.c177 forest_realm = subdom->forest_root->realm;
191 id_ctx->server_mode->realm,
287 /* Set KRB5 realm to same as the one of IPA when IPA
290 id_ctx->server_mode->realm,
655 state->forest_realm = subdom->forest_root->realm;
657 DB_PATH, subdom->parent->realm);
1115 char *realm; local
1141 realm = dp_opt_get_string(id_ctx->ipa_options->basic, IPA_KRB5_REALM);
1142 if (realm == NULL) {
1143 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm fo
[all...]
/sssd-io/src/providers/ldap/
H A Dsdap_utils.c236 const char *realm; local
243 realm = dp_opt_get_cstring(sdap_basic_opts, SDAP_KRB5_REALM);
244 if (realm == NULL) {
256 p + 1, realm);
H A Dsdap_dyndns.c50 const char *realm; member in struct:sdap_dyndns_update_state
91 const char *realm,
108 state->realm = realm;
323 const char *realm; local
329 realm = NULL;
332 realm = state->realm;
335 ret = be_nsupdate_create_fwd_msg(state, realm, servername,
461 const char *realm; local
83 sdap_dyndns_update_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct dp_option *opts, struct sdap_id_ctx *sdap_ctx, enum be_nsupdate_auth auth_type, const char *ifname, const char *hostname, const char *realm, const int ttl, bool check_diff) argument
[all...]
H A Dldap_common.c161 char *realm = (char *) private_data; local
164 ret = remove_krb5_info_files(se, realm);
174 const char *realm)
181 sig_realm = talloc_strdup(mem_ctx, realm);
223 ret = remove_krb5_info_files(tmp_ctx, ctx->realm);
234 const char *realm,
247 ctx->realm = talloc_strdup(ctx, realm);
249 if (ctx->realm == NULL || ctx->kdc_service_name == NULL) {
290 /* Configuration of SASL auth ID and realm */
172 sdap_install_sigterm_handler(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *realm) argument
232 sdap_install_offline_callback(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, const char *realm, const char *service_name) argument
363 const char *realm = NULL; local
395 const char *realm; local
[all...]
H A Dsdap_async_connection.c1056 const char *realm; member in struct:sdap_kinit_state
1081 const char *realm,
1092 principal, realm, lifetime);
1104 state->realm = realm;
1174 tgtreq = sdap_get_tgt_send(state, state->ev, state->realm,
1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
/sssd-io/src/tests/python/sssd/testlib/common/
H A Dqe_class.py191 realm (str): Return AD realm in upper case
201 def realm(self): member in class:QeWinHost
/sssd-io/src/krb5_plugin/
H A Dsssd_krb5_locator_plugin.c85 static int get_krb5info(const char *realm, struct sssd_ctx *ctx, argument
111 len = strlen(realm) + strlen(name_tmpl);
119 ret = snprintf(krb5info_name, len, name_tmpl, realm);
269 const char *realm,
291 if (ctx->sssd_realm == NULL || strcmp(ctx->sssd_realm, realm) != 0) {
293 ctx->sssd_realm = strdup(realm);
299 ret = get_krb5info(realm, ctx, locate_service_kdc);
307 ret = get_krb5info(realm, ctx, locate_service_kpasswd);
318 PLUGIN_DEBUG(("sssd_realm[%s] requested realm[%s] family[%d] socktype[%d] "
319 "locate_service[%d]\n", ctx->sssd_realm, realm, famil
267 sssd_krb5_locator_lookup(void *private_data, enum locate_service_type svc, const char *realm, int socktype, int family, int (*cbfunc)(void *, int, struct sockaddr *), void *cbdata) argument
[all...]
/sssd-io/src/db/
H A Dsysdb_subdomains.c34 const char *realm,
87 if (realm != NULL) {
88 dom->realm = talloc_strdup(dom, realm);
89 if (dom->realm == NULL) {
90 DEBUG(SSSDBG_OP_FAILURE, "Failed to copy realm name.\n");
244 if (d->realm && (strcasecmp(d->forest, d->realm) == 0)) {
255 && root->realm != NULL
256 && strcasecmp(member->forest, root->realm)
31 new_subdomain(TALLOC_CTX *mem_ctx, struct sss_domain_info *parent, const char *name, const char *realm, const char *flat_name, const char *id, bool mpg, bool enumerate, const char *forest, const char **upn_suffixes, uint32_t trust_direction, struct confdb_ctx *confdb) argument
319 const char *realm; local
737 sysdb_master_domain_add_info(struct sss_domain_info *domain, const char *realm, const char *flat, const char *id, const char *forest, struct ldb_message_element *upn_suffixes) argument
894 sysdb_subdomain_store(struct sysdb_ctx *sysdb, const char *name, const char *realm, const char *flat_name, const char *domain_id, bool mpg, bool enumerate, const char *forest, uint32_t trust_direction, struct ldb_message_element *upn_suffixes) argument
[all...]
/sssd-io/src/lib/certmap/
H A Dsss_cert_content_nss.c293 struct realm { struct
343 SECItem realm; member in struct:kerberos_principal_name
355 offsetof(struct kerberos_principal_name, realm),
357 sizeof(struct realm),
521 kname.realm.len,
522 (char *) kname.realm.data);
/sssd-io/src/tests/
H A Dkrb5_child-test.c97 create_dummy_krb5_ctx(TALLOC_CTX *mem_ctx, const char *realm) argument
147 ret = dp_opt_set_string(krb5_ctx->opts, KRB5_REALM, realm);
189 const char *password, const char *realm,
212 kr->krb5_ctx = create_dummy_krb5_ctx(kr, realm);
426 { "realm", 'r', POPT_ARG_STRING, &pc_realm, 0,
427 "The Kerberos realm to use", NULL },
471 DEBUG(SSSDBG_FATAL_FAILURE, "Please specify the realm\n");
188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, const char *password, const char *realm, const char *ccname, const char *ccname_template, int timeout) argument
/sssd-io/src/providers/ad/
H A Dad_common.c272 const char *realm,
279 ret = dp_opt_set_string(ad_options->basic, AD_KRB5_REALM, realm);
281 DEBUG(SSSDBG_OP_FAILURE, "Cannot set AD krb5 realm\n");
313 const char *realm,
330 ret = set_common_ad_trust_opts(ad_options, realm, subdom->name, hostname,
359 const char *realm; local
371 realm = get_uppercase_realm(ad_options, subdom->name);
372 if (!realm) {
373 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to get uppercase realm\n");
378 ret = set_common_ad_trust_opts(ad_options, realm,
271 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument
309 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb, const char *conf_path, struct data_provider *dp, const char *realm, struct sss_domain_info *subdom, const char *hostname, const char *keytab) argument
420 char *realm; local
[all...]
H A Dad_id.c513 const char *realm; member in struct:ad_enumeration_state
553 state->realm = dp_opt_get_cstring(state->id_ctx->ad_options->basic,
555 if (state->realm == NULL) {
556 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm\n");
643 ret = sysdb_master_domain_add_info(state->sdom->dom, state->realm,
H A Dad_subdomains.c246 const char *realm; local
253 realm = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KRB5_REALM);
257 if (realm == NULL || hostname == NULL || ad_domain == NULL) {
258 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm or hostname.\n");
272 realm,
299 ret = ad_failover_init(ad_options, be_ctx, servers, backup_servers, realm,
406 char *realm; local
434 realm = get_uppercase_realm(tmp_ctx, name);
435 if (!realm) {
471 ret = sysdb_subdomain_store(domain->sysdb, name, realm, fla
1376 const char *realm; local
[all...]
/sssd-io/src/util/
H A Dusertools.c41 /* Function returns given realm name as new uppercase string */
44 char *realm; local
47 realm = talloc_strdup(memctx, name);
48 if (!realm) {
52 c = realm;
58 return realm;
H A Dsss_krb5.c83 char *realm = NULL; local
157 realm = talloc_asprintf(tmp_ctx, realm_patterns[i], desired_realm);
158 if (realm == NULL) {
163 realm = NULL;
166 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm,
169 talloc_zfree(realm);
241 DEBUG(SSSDBG_FUNC_DATA, "Selected realm: %s\n", *_realm);
278 * @param pattern_realm realm part of the principal we want to perform
699 /* omit realm if local realm */
779 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument
793 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument
1085 sss_krb5_realm_has_proxy(const char *realm) argument
[all...]
/sssd-io/src/providers/
H A Dbe_dyndns.c401 nsupdate_msg_add_realm_cmd(TALLOC_CTX *mem_ctx, const char *realm) argument
404 if (realm != NULL) {
405 return talloc_asprintf(mem_ctx, "realm %s\n", realm);
412 nsupdate_msg_create_common(TALLOC_CTX *mem_ctx, const char *realm, argument
422 realm_directive = nsupdate_msg_add_realm_cmd(tmp_ctx, realm);
432 "Creating update message for server [%s] and realm [%s].\n",
433 servername, realm);
435 /* Add the server, realm and headers */
438 } else if (realm !
463 be_nsupdate_create_fwd_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, uint8_t remove_af, struct sss_iface_addr *addresses, char **_update_msg) argument
508 be_nsupdate_create_ptr_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, struct sockaddr_storage *address, bool delete, char **_update_msg) argument
[all...]

Completed in 718 milliseconds

12