| /sssd-io/src/providers/krb5/ |
| H A D | krb5_init.c | 38 const char *realm; local 45 realm = dp_opt_get_string(ctx->opts, KRB5_REALM); 46 if (realm == NULL) { 69 primary_servers, backup_servers, realm, 85 const char *realm; local 89 realm = dp_opt_get_string(ctx->opts, KRB5_REALM); 90 if (realm == NULL) { 101 primary_servers, backup_servers, realm,
|
| H A D | krb5_auth.c | 462 const char *realm; local 601 realm = dp_opt_get_cstring(krb5_ctx->opts, KRB5_REALM); 602 if (realm == NULL) { 603 DEBUG(SSSDBG_CRIT_FAILURE, "Missing Kerberos realm.\n"); 624 ret = compare_principal_realm(kr->upn, realm,
|
| H A D | krb5_ccache.c | 474 const char *realm, const char *principal) 507 tgt_name = talloc_asprintf(tmp_ctx, "krbtgt/%s@%s", realm, realm); 473 sss_krb5_cc_verify_ccache(const char *ccname, uid_t uid, gid_t gid, const char *realm, const char *principal) argument
|
| H A D | krb5_common.h | 71 char *realm; member in struct:krb5_service 135 char *realm; member in struct:krb5_ctx 144 char *realm; member in struct:remove_info_files_ctx 160 errno_t write_krb5info_file(const char *realm, const char *kdc, 167 const char *realm, 186 errno_t remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm); 192 errno_t compare_principal_realm(const char *upn, const char *realm,
|
| H A D | krb5_common.c | 170 const char *realm; local 184 realm = dp_opt_get_cstring(opts, KRB5_REALM); 185 if (realm == NULL) { 191 realm = dom->name; 194 krb5_ctx->realm = talloc_strdup(krb5_ctx, realm); 195 if (krb5_ctx->realm == NULL) { 197 "Failed to set realm, krb5_child might not work as expected.\n"); 392 errno_t write_krb5info_file(const char *realm, const char *server, argument 404 if (realm 722 krb5_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx, const char *service_name, const char *primary_servers, const char *backup_servers, const char *realm, bool use_kdcinfo, struct krb5_service **_service) argument 802 remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm) argument 889 char *realm = (char *)private_data; local 994 const char *realm = NULL; local 1052 compare_principal_realm(const char *upn, const char *realm, bool *different_realm) argument [all...] |
| /sssd-io/src/providers/ipa/ |
| H A D | ipa_subdomains.h | 101 const char *realm; member in struct:ipa_server_mode_ctx
|
| H A D | ipa_auth.c | 240 char *realm; local 262 realm = dp_opt_get_string(state->auth_ctx->ipa_options, IPA_KRB5_REALM); 265 realm);
|
| H A D | ipa_common.c | 49 char *realm; local 97 /* First check whether the realm has been manually specified */ 98 realm = dp_opt_get_string(opts->basic, IPA_KRB5_REALM); 99 if (!realm) { 101 realm = get_uppercase_realm(opts, domain); 102 if (!realm) { 108 realm); 179 char *realm; local 242 /* set krb realm */ 244 realm 959 char *realm; local [all...] |
| H A D | ipa_id.c | 227 const char *realm; member in struct:ipa_initgr_get_overrides_state 266 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic, 268 if (state->realm == NULL) { 269 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n"); 350 state->realm, 495 const char *realm; member in struct:ipa_id_get_account_info_state 556 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic, 558 if (state->realm == NULL) { 559 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n"); 616 state->ipa_ctx->ipa_options, state->realm, [all...] |
| H A D | ipa_subdomains_server.c | 177 forest_realm = subdom->forest_root->realm; 191 id_ctx->server_mode->realm, 287 /* Set KRB5 realm to same as the one of IPA when IPA 290 id_ctx->server_mode->realm, 655 state->forest_realm = subdom->forest_root->realm; 657 DB_PATH, subdom->parent->realm); 1115 char *realm; local 1141 realm = dp_opt_get_string(id_ctx->ipa_options->basic, IPA_KRB5_REALM); 1142 if (realm == NULL) { 1143 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm fo [all...] |
| /sssd-io/src/providers/ldap/ |
| H A D | sdap_utils.c | 236 const char *realm; local 243 realm = dp_opt_get_cstring(sdap_basic_opts, SDAP_KRB5_REALM); 244 if (realm == NULL) { 256 p + 1, realm);
|
| H A D | sdap_dyndns.c | 50 const char *realm; member in struct:sdap_dyndns_update_state 91 const char *realm, 108 state->realm = realm; 323 const char *realm; local 329 realm = NULL; 332 realm = state->realm; 335 ret = be_nsupdate_create_fwd_msg(state, realm, servername, 461 const char *realm; local 83 sdap_dyndns_update_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct dp_option *opts, struct sdap_id_ctx *sdap_ctx, enum be_nsupdate_auth auth_type, const char *ifname, const char *hostname, const char *realm, const int ttl, bool check_diff) argument [all...] |
| H A D | ldap_common.c | 161 char *realm = (char *) private_data; local 164 ret = remove_krb5_info_files(se, realm); 174 const char *realm) 181 sig_realm = talloc_strdup(mem_ctx, realm); 223 ret = remove_krb5_info_files(tmp_ctx, ctx->realm); 234 const char *realm, 247 ctx->realm = talloc_strdup(ctx, realm); 249 if (ctx->realm == NULL || ctx->kdc_service_name == NULL) { 290 /* Configuration of SASL auth ID and realm */ 172 sdap_install_sigterm_handler(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *realm) argument 232 sdap_install_offline_callback(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, const char *realm, const char *service_name) argument 363 const char *realm = NULL; local 395 const char *realm; local [all...] |
| H A D | sdap_async_connection.c | 1056 const char *realm; member in struct:sdap_kinit_state 1081 const char *realm, 1092 principal, realm, lifetime); 1104 state->realm = realm; 1174 tgtreq = sdap_get_tgt_send(state, state->ev, state->realm, 1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
|
| /sssd-io/src/tests/python/sssd/testlib/common/ |
| H A D | qe_class.py | 191 realm (str): Return AD realm in upper case 201 def realm(self): member in class:QeWinHost
|
| /sssd-io/src/krb5_plugin/ |
| H A D | sssd_krb5_locator_plugin.c | 85 static int get_krb5info(const char *realm, struct sssd_ctx *ctx, argument 111 len = strlen(realm) + strlen(name_tmpl); 119 ret = snprintf(krb5info_name, len, name_tmpl, realm); 269 const char *realm, 291 if (ctx->sssd_realm == NULL || strcmp(ctx->sssd_realm, realm) != 0) { 293 ctx->sssd_realm = strdup(realm); 299 ret = get_krb5info(realm, ctx, locate_service_kdc); 307 ret = get_krb5info(realm, ctx, locate_service_kpasswd); 318 PLUGIN_DEBUG(("sssd_realm[%s] requested realm[%s] family[%d] socktype[%d] " 319 "locate_service[%d]\n", ctx->sssd_realm, realm, famil 267 sssd_krb5_locator_lookup(void *private_data, enum locate_service_type svc, const char *realm, int socktype, int family, int (*cbfunc)(void *, int, struct sockaddr *), void *cbdata) argument [all...] |
| /sssd-io/src/db/ |
| H A D | sysdb_subdomains.c | 34 const char *realm, 87 if (realm != NULL) { 88 dom->realm = talloc_strdup(dom, realm); 89 if (dom->realm == NULL) { 90 DEBUG(SSSDBG_OP_FAILURE, "Failed to copy realm name.\n"); 244 if (d->realm && (strcasecmp(d->forest, d->realm) == 0)) { 255 && root->realm != NULL 256 && strcasecmp(member->forest, root->realm) 31 new_subdomain(TALLOC_CTX *mem_ctx, struct sss_domain_info *parent, const char *name, const char *realm, const char *flat_name, const char *id, bool mpg, bool enumerate, const char *forest, const char **upn_suffixes, uint32_t trust_direction, struct confdb_ctx *confdb) argument 319 const char *realm; local 737 sysdb_master_domain_add_info(struct sss_domain_info *domain, const char *realm, const char *flat, const char *id, const char *forest, struct ldb_message_element *upn_suffixes) argument 894 sysdb_subdomain_store(struct sysdb_ctx *sysdb, const char *name, const char *realm, const char *flat_name, const char *domain_id, bool mpg, bool enumerate, const char *forest, uint32_t trust_direction, struct ldb_message_element *upn_suffixes) argument [all...] |
| /sssd-io/src/lib/certmap/ |
| H A D | sss_cert_content_nss.c | 293 struct realm { struct 343 SECItem realm; member in struct:kerberos_principal_name 355 offsetof(struct kerberos_principal_name, realm), 357 sizeof(struct realm), 521 kname.realm.len, 522 (char *) kname.realm.data);
|
| /sssd-io/src/tests/ |
| H A D | krb5_child-test.c | 97 create_dummy_krb5_ctx(TALLOC_CTX *mem_ctx, const char *realm) argument 147 ret = dp_opt_set_string(krb5_ctx->opts, KRB5_REALM, realm); 189 const char *password, const char *realm, 212 kr->krb5_ctx = create_dummy_krb5_ctx(kr, realm); 426 { "realm", 'r', POPT_ARG_STRING, &pc_realm, 0, 427 "The Kerberos realm to use", NULL }, 471 DEBUG(SSSDBG_FATAL_FAILURE, "Please specify the realm\n"); 188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, const char *password, const char *realm, const char *ccname, const char *ccname_template, int timeout) argument
|
| /sssd-io/src/providers/ad/ |
| H A D | ad_common.c | 272 const char *realm, 279 ret = dp_opt_set_string(ad_options->basic, AD_KRB5_REALM, realm); 281 DEBUG(SSSDBG_OP_FAILURE, "Cannot set AD krb5 realm\n"); 313 const char *realm, 330 ret = set_common_ad_trust_opts(ad_options, realm, subdom->name, hostname, 359 const char *realm; local 371 realm = get_uppercase_realm(ad_options, subdom->name); 372 if (!realm) { 373 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to get uppercase realm\n"); 378 ret = set_common_ad_trust_opts(ad_options, realm, 271 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument 309 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb, const char *conf_path, struct data_provider *dp, const char *realm, struct sss_domain_info *subdom, const char *hostname, const char *keytab) argument 420 char *realm; local [all...] |
| H A D | ad_id.c | 513 const char *realm; member in struct:ad_enumeration_state 553 state->realm = dp_opt_get_cstring(state->id_ctx->ad_options->basic, 555 if (state->realm == NULL) { 556 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm\n"); 643 ret = sysdb_master_domain_add_info(state->sdom->dom, state->realm,
|
| H A D | ad_subdomains.c | 246 const char *realm; local 253 realm = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KRB5_REALM); 257 if (realm == NULL || hostname == NULL || ad_domain == NULL) { 258 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm or hostname.\n"); 272 realm, 299 ret = ad_failover_init(ad_options, be_ctx, servers, backup_servers, realm, 406 char *realm; local 434 realm = get_uppercase_realm(tmp_ctx, name); 435 if (!realm) { 471 ret = sysdb_subdomain_store(domain->sysdb, name, realm, fla 1376 const char *realm; local [all...] |
| /sssd-io/src/util/ |
| H A D | usertools.c | 41 /* Function returns given realm name as new uppercase string */ 44 char *realm; local 47 realm = talloc_strdup(memctx, name); 48 if (!realm) { 52 c = realm; 58 return realm;
|
| H A D | sss_krb5.c | 83 char *realm = NULL; local 157 realm = talloc_asprintf(tmp_ctx, realm_patterns[i], desired_realm); 158 if (realm == NULL) { 163 realm = NULL; 166 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm, 169 talloc_zfree(realm); 241 DEBUG(SSSDBG_FUNC_DATA, "Selected realm: %s\n", *_realm); 278 * @param pattern_realm realm part of the principal we want to perform 699 /* omit realm if local realm */ 779 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument 793 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument 1085 sss_krb5_realm_has_proxy(const char *realm) argument [all...] |
| /sssd-io/src/providers/ |
| H A D | be_dyndns.c | 401 nsupdate_msg_add_realm_cmd(TALLOC_CTX *mem_ctx, const char *realm) argument 404 if (realm != NULL) { 405 return talloc_asprintf(mem_ctx, "realm %s\n", realm); 412 nsupdate_msg_create_common(TALLOC_CTX *mem_ctx, const char *realm, argument 422 realm_directive = nsupdate_msg_add_realm_cmd(tmp_ctx, realm); 432 "Creating update message for server [%s] and realm [%s].\n", 433 servername, realm); 435 /* Add the server, realm and headers */ 438 } else if (realm ! 463 be_nsupdate_create_fwd_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, uint8_t remove_af, struct sss_iface_addr *addresses, char **_update_msg) argument 508 be_nsupdate_create_ptr_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, struct sockaddr_storage *address, bool delete, char **_update_msg) argument [all...] |