Searched defs:uid (Results 1 - 25 of 90) sorted by relevance

1234

/sssd/src/util/
H A Dsss_nss.h31 uint32_t uid; member in struct:sss_nss_homedir_ctx
H A Dbecome_user.c28 errno_t become_user(uid_t uid, gid_t gid) argument
34 "Trying to become user [%"SPRIuid"][%"SPRIgid"].\n", uid, gid);
38 if (uid == cuid) {
39 DEBUG(SSSDBG_FUNC_DATA, "Already user [%"SPRIuid"].\n", uid);
61 /* change uid so that root cannot be regained (changes saved uid too) */
63 ret = setresuid(uid, uid, uid);
75 uid_t uid; member in struct:sss_creds
85 switch_creds(TALLOC_CTX *mem_ctx, uid_t uid, gid_t gid, int num_gids, gid_t *gids, struct sss_creds **saved_creds) argument
[all...]
H A Dcheck_and_open.c33 uid_t uid, gid_t gid,
37 uid_t uid, uid_t gid, mode_t mode, mode_t mask,
61 return perform_checks(stat_buf, uid, gid, mode, mask);
64 errno_t check_fd(int fd, uid_t uid, gid_t gid, argument
86 return perform_checks(stat_buf, uid, gid, mode, mask);
90 uid_t uid, gid_t gid,
114 if (uid != (uid_t)(-1) && stat_buf->st_uid != uid) {
115 DEBUG(SSSDBG_TRACE_LIBS, "File must be owned by uid [%d].\n", uid);
36 check_file(const char *filename, uid_t uid, uid_t gid, mode_t mode, mode_t mask, struct stat *caller_stat_buf, bool follow_symlink) argument
89 perform_checks(struct stat *stat_buf, uid_t uid, gid_t gid, mode_t mode, mode_t mask) argument
127 check_and_open_readonly(const char *filename, int *fd, uid_t uid, gid_t gid, mode_t mode, mode_t mask) argument
[all...]
/sssd/src/providers/data_provider/
H A Ddp.c43 provider->uid, provider->gid, true,
72 uid_t uid,
85 provider->uid = uid;
70 dp_init(struct tevent_context *ev, struct be_ctx *be_ctx, uid_t uid, gid_t gid) argument
/sssd/src/responder/common/
H A Dnegcache_files.c54 bool is_user_local_by_uid(uid_t uid) argument
62 ret = getpwuid_r(uid, &pwd, buffer, BUFFER_SIZE, &pwd_result);
65 "User with UID %"SPRIuid" is a local user\n", uid);
/sssd/src/tests/cmocka/
H A Dtest_find_uid.c40 uid_t uid; local
43 uid = getuid();
45 ret = check_if_uid_is_active(uid, &result);
53 uid_t uid; local
56 uid = (uid_t) -7;
58 ret = check_if_uid_is_active(uid, &result);
66 uid_t uid; local
78 uid = getuid();
80 key.ul = (unsigned long) uid;
86 uid
[all...]
/sssd/src/tests/cwrap/
H A Dtest_usertools.c33 uid_t uid; local
37 ret = sss_user_by_name_or_uid("123", &uid, &gid);
39 assert_int_equal(uid, 123);
45 uid_t uid; local
49 ret = sss_user_by_name_or_uid("sssd", &uid, &gid);
51 assert_int_equal(uid, 123);
57 uid_t uid; local
61 ret = sss_user_by_name_or_uid("sssd", &uid, NULL);
63 assert_int_equal(uid, 123);
/sssd/src/tests/
H A Dfind_uid-tests.c37 uid_t uid; local
41 uid = getuid();
43 ret = check_if_uid_is_active(uid, &result);
45 fail_unless(result, "check_if_uid_is_active did not found my uid [%d]",
46 uid);
52 uid_t uid; local
56 uid = (uid_t) -4;
58 ret = check_if_uid_is_active(uid, &result);
61 "uid [%d]", uid);
67 uid_t uid; local
[all...]
H A Dcheck_and_open-tests.c38 uid_t uid; variable
57 uid = getuid();
83 uid, gid, S_IFREG|mode, 0);
108 ret = check_file(newpath, uid, gid, S_IFREG|mode, 0, NULL, false);
135 ret = check_file(newpath, uid, gid, S_IFREG|mode, 0, NULL, true);
148 ret = check_and_open_readonly("/dev/null", &fd, uid, gid, S_IFREG|mode, 0);
159 ret = check_and_open_readonly(filename, &fd, uid+1, gid, S_IFREG|mode, 0);
161 "check_and_open_readonly succeeded with wrong uid");
170 ret = check_and_open_readonly(filename, &fd, uid, gid+1, S_IFREG|mode, 0);
182 uid, gi
[all...]
H A Dresponder_socket_access-tests.c95 uid_t uid; member in struct:uid_check_data
116 ret = check_allowed_uids(uid_check_data[c].uid,
/sssd/src/responder/sudo/
H A Dsudosrv_private.h59 uid_t uid; member in struct:sudo_cmd_ctx
73 uid_t uid,
H A Dsudosrv.c172 uid_t uid; local
178 SSSD_SERVER_OPTS(uid, gid)
205 ret = server_setup("sssd[sudo]", 0, uid, gid, CONFDB_SUDO_CONF_ENTRY,
/sssd/src/sss_client/libwbclient/
H A Dwbc_idmap_common.c26 /* Convert a Windows SID to a Unix uid if there already is a mapping */
33 /* Convert a Unix uid to a Windows SID if there already is a mapping */
34 wbcErr wbcQueryUidToSid(uid_t uid, argument
56 wbcErr wbcSetUidMapping(uid_t uid, const struct wbcDomainSid *sid) argument
68 wbcErr wbcRemoveUidMapping(uid_t uid, const struct wbcDomainSid *sid) argument
H A Dwbc_idmap_sssd.c29 /* Convert a Windows SID to a Unix uid, allocating an uid if needed */
58 /* Convert a Unix uid to a Windows SID, allocating a SID if needed */
59 wbcErr wbcUidToSid(uid_t uid, struct wbcDomainSid *sid) argument
66 ret = sss_nss_getsidbyid(uid, &str_sid, &type);
149 /* Obtain a new uid from Winbind */
188 ids[c].id.uid = (uid_t) id;
196 ids[c].id.uid = (uid_t) id;
215 wbc_status = wbcUidToSid(ids[c].id.uid, &sids[c]);
H A Dwbc_pam_sssd.c105 uid_t uid,
104 wbcLogoffUser(const char *username, uid_t uid, const char *ccfilename) argument
/sssd/src/sss_client/sudo_testcli/
H A Dsudo_testcli.c46 uid_t uid = 0; local
50 fprintf(stderr, "Usage: sss_sudo_cli username [uid]\n");
56 uid = atoi(argv[2]);
63 uid = passwd->pw_uid;
70 ret = sss_sudo_send_recv_defaults(uid, username, &error,
79 username, (unsigned long long)uid,
93 ret = sss_sudo_send_recv(uid, username, domainname, &error, &result);
/sssd/src/responder/common/cache_req/plugins/
H A Dcache_req_user_by_id.c133 uid_t uid)
137 data = cache_req_data_id(mem_ctx, CACHE_REQ_USER_BY_ID, uid);
127 cache_req_user_by_id_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_nc_ctx *ncache, int cache_refresh_percent, const char *domain, uid_t uid) argument
/sssd/src/responder/secrets/
H A Dsecsrv.c185 uid_t uid; local
191 SSSD_SERVER_OPTS(uid, gid)
218 ret = server_setup("sssd[secrets]", 0, uid, gid, CONFDB_SEC_CONF_ENTRY,
/sssd/src/responder/ssh/
H A Dsshsrv.c182 uid_t uid; local
188 SSSD_SERVER_OPTS(uid, gid)
215 ret = server_setup("sssd[ssh]", 0, uid, gid,
/sssd/src/sss_client/
H A Dnss_mc_passwd.c62 result->pw_uid = data->uid;
178 errno_t sss_nss_mc_getpwuid(uid_t uid, argument
195 len = snprintf(uidstr, 11, "%ld", (long)uid);
220 /* if uid hash does not match we can skip this immediately */
226 if (uid == data->uid) {
/sssd/src/tools/
H A Dsss_userdel.c52 static int is_logged_in(TALLOC_CTX *mem_ctx, uid_t uid) argument
67 key.ul = (unsigned long) uid;
232 if ((tctx->octx->uid < tctx->local->id_min) ||
233 (tctx->local->id_max && tctx->octx->uid > tctx->local->id_max)) {
265 ret = is_logged_in(tctx, tctx->octx->uid);
271 ERROR("WARNING: The user (uid %1$lu) was still logged in when "
272 "deleted.\n", (unsigned long) tctx->octx->uid);
305 tctx->octx->uid,
H A Dsss_sync_ops.h41 uid_t uid; member in struct:ops_ctx
/sssd/src/lib/sifp/
H A Dsss_sifp_common.c165 uid_t uid,
168 uint64_t _uid = uid;
164 sss_sifp_fetch_user_by_uid(sss_sifp_ctx *ctx, uid_t uid, sss_sifp_object **_user) argument
/sssd/src/providers/krb5/
H A Dkrb5_auth.h41 #define CHILD_OPT_FAST_CCACHE_UID "fast-ccache-uid"
58 uid_t uid; member in struct:krb5child_req
122 uid_t uid);
H A Dkrb5_delayed_online_authentication.c238 uid_t uid)
299 key.ul = uid;
236 add_user_to_delayed_online_authentication(struct krb5_ctx *krb5_ctx, struct pam_data *pd, uid_t uid) argument

Completed in 301 milliseconds

1234