| /sssd-io/src/tests/intg/ |
| H A D | ldap_ent.py | 21 def user(base_dn, uid, uidNumber, gidNumber, function 29 Generate an RFC2307(bis) user add-modlist for passing to ldap.add* 33 user = ( 53 user[1].append(('gecos', [gecos.encode('utf-8')])) 54 return user 122 """Add an RFC2307(bis) user add-modlist.""" 123 self.append(user(base_dn or self.base_dn,
|
| H A D | sssd_ldb.py | 31 user = 1 variable in class:TsCacheEntry 66 if entry_type == TsCacheEntry.user:
|
| /sssd-io/src/sss_client/ |
| H A D | nss_compat.h | 45 const char *user; member in struct:__netgrent::__anon41::__anon42
|
| H A D | nss_group.c | 270 enum nss_status _nss_sss_initgroups_dyn(const char *user, gid_t group, argument 285 ret = sss_strnlen(user, SSS_NAME_MAX, &user_len); 291 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size, 311 rd.data = user; 316 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
|
| /sssd-io/src/responder/nss/ |
| H A D | nss_protocol_netgr.c | 31 struct sized_string user; local 38 to_sized_string(&user, entry->value.triple.username); 46 if (user.len == 0) { 47 user.len = 1; 48 user.str = ""; 57 + host.len + user.len + domain.len); 67 SAFEALIGN_SET_STRING(&body[*_rp], user.str, user.len, _rp);
|
| H A D | nss_iface.c | 79 /* The user is gone. Invalidate the mc record */ 90 /* we skip the first entry, it's the user itself */ 186 const char *user, 195 user, domain); 197 nss_update_initgr_memcache(nctx, user, domain, num_groups, groups); 184 nss_memorycache_update_initgroups(struct sbus_request *sbus_req, void *data, const char *user, const char *domain, uint32_t *groups, int num_groups) argument
|
| H A D | nss_protocol_grent.c | 318 struct ldb_message *user; local 346 user = result->msgs[0]; 347 gid = sss_view_ldb_msg_find_attr_as_uint64(domain, user, SYSDB_GIDNUM, 0); 348 orig_gid = sss_view_ldb_msg_find_attr_as_uint64(domain, user, 356 /* First message is user, skip it. */ 379 /* Do not add the GID of the original primary group if the user is
|
| /sssd-io/src/sss_client/libwbclient/ |
| H A D | wbc_pam_sssd.c | 96 /* Trigger an extended logoff notification to Winbind for a specific user */ 103 /* Trigger a logoff notification to Winbind for a specific user */ 111 /* Change a password for a user with more detailed information upon failure */ 128 /* Change a password for a user */ 167 /* Authenticate a user with cached credentials */ 179 /* Authenticate a user with cached credentials */ 180 wbcErr wbcCredentialSave(const char *user, const char *password) argument
|
| /sssd-io/src/providers/ipa/ |
| H A D | ipa_deskprofile_rules.c | 65 char *user; local 162 ret = sss_parse_internal_fqname(state, username, &user, NULL); 171 IPA_MEMBER_USER, user);
|
| H A D | ipa_deskprofile_rules_util.c | 52 * 1 = user, group, host, hostgroup 53 * 2 = user, group, hostgroup, host 54 * 3 = user, host, group, hostgroup 55 * 4 = user, host, hostgroup, group 56 * 5 = user, hostgroup, group, host 57 * 6 = user, hostgroup, host, group 58 * 7 = group, user, host, hostgroup 59 * 8 = group, user, hostgroup, host 60 * 9 = group, host, user, hostgroup 61 * 10 = group, host, hostgroup, user 357 bool user = false; local [all...] |
| /sssd-io/src/providers/krb5/ |
| H A D | krb5_auth.h | 70 const char *user; member in struct:krb5child_req
|
| H A D | krb5_utils.c | 36 struct sss_domain_info *dom, const char *user, 42 if (krb5_ctx == NULL || dom == NULL || user == NULL || _upn == NULL) { 60 ret = krb5_get_simple_upn(mem_ctx, krb5_ctx, dom, user, 81 const char *user, 94 if (sysdb == NULL || user == NULL || upn == NULL) { 104 ret = sysdb_get_user_attr(tmp_ctx, domain, user, attrs, &res); 111 DEBUG(SSSDBG_OP_FAILURE, "[%d] user objects for name [%s] found, " \ 112 "expected 1.\n", res->count, user); 139 "for user [%s].\n", 142 upn, user); 34 find_or_guess_upn(TALLOC_CTX *mem_ctx, struct ldb_message *msg, struct krb5_ctx *krb5_ctx, struct sss_domain_info *dom, const char *user, const char *user_dom, char **_upn) argument 79 check_if_cached_upn_needs_update(struct sysdb_ctx *sysdb, struct sss_domain_info *domain, const char *user, const char *upn) argument [all...] |
| /sssd-io/src/responder/common/cache_req/plugins/ |
| H A D | cache_req_initgroups_by_name.c | 120 struct ldb_result *user; local 144 cr->data->name.lookup, &user); 145 if (ret != EOK || user == NULL || user->count != 1) { 146 /* Case where the user is not found has been already handled. If 149 "Unable to match initgroups user [%d]: %s\n", 154 name = ldb_msg_find_attr_as_string(user->msgs[0], SYSDB_NAME, NULL); 157 talloc_free(user); 165 talloc_free(user);
|
| /sssd-io/src/tools/sssctl/ |
| H A D | sssctl_user_checks.c | 67 static int get_ifp_user(const char *user) argument 95 error = sss_sifp_fetch_user_by_name(sifp, user, &user_obj); 97 fprintf(stderr, _("Unable to get user object")); 101 fprintf(stdout, _("SSSD InfoPipe user lookup result:\n")); 113 fprintf(stderr, _("Unable to get user name attr")); 131 static int sss_getpwnam_check(const char *user) argument 166 status = sss_getpwnam_r(user, &pwd, buffer, buflen, &nss_errno); 173 fprintf(stdout, _("SSSD nss user lookup result:\n")); 174 fprintf(stdout, _(" - user name: %s\n"), pwd.pw_name); 175 fprintf(stdout, _(" - user i 199 const char *user = NULL; local [all...] |
| /sssd-io/src/util/ |
| H A D | sss_selinux.c | 51 struct sysdb_attrs *user, 73 /* Search for user and host related elements */ 86 if (user) { 87 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_DN, &dn); 92 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_MEMBEROF, &memberof); 101 * The rule won't match if user category != "all" and user map doesn't 102 * contain neither user nor any of his groups in memberUser attribute 150 * The rule won't match if host category != "all" and user map doesn't 50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
|
| /sssd-io/src/lib/ipa_hbac/ |
| H A D | ipa_hbac.h | 33 * a particular user login attempt. 135 * - Users: user groups (POSIX or non-POSIX) 193 * - Users: user groups (POSIX or non-POSIX) 213 /** This is a list of user DNs to check, 214 * it must consist of the actual user 216 * containing that user. 218 struct hbac_request_element *user; member in struct:hbac_eval_req 279 * @param[in] hbac_req A user authorization request
|
| /sssd-io/src/providers/ldap/ |
| H A D | ldap_id_cleanup.c | 173 struct ldb_message *user); 230 DEBUG(SSSDBG_FUNC_DATA, "Found %zu expired user entries!\n", count); 254 DEBUG(SSSDBG_TRACE_ALL, "Processing user %s\n", name); 259 /* If the user is logged in, proceed to the next one */ 266 "Cannot check if user is logged in: %d\n", ret); 272 DEBUG(SSSDBG_TRACE_ALL, "About to delete user %s\n", name); 279 /* Mark all groups of which user was a member as expired in cache, 297 struct ldb_message *user) 308 memberof_el = ldb_msg_find_element(user, SYSDB_MEMBEROF); 296 expire_memberof_target_groups(struct sss_domain_info *dom, struct ldb_message *user) argument
|
| H A D | sdap_async_users.c | 207 DEBUG(SSSDBG_TRACE_FUNC, "Save user\n"); 233 DEBUG(SSSDBG_TRACE_ALL, "objectSID: not available for user\n"); 265 DEBUG(SSSDBG_OP_FAILURE, "Failed to get user name\n"); 268 DEBUG(SSSDBG_TRACE_FUNC, "Processing user %s\n", user_name); 296 /* Fall back to the user's full name */ 325 "unix ID to user [%s].\n", user_name); 331 "Mapping user [%s] objectSID [%s] to unix ID\n", user_name, sid_str); 333 /* Convert the SID into a UNIX user ID */ 373 /* check that the uid is valid for this domain if the user is a POSIX one */ 397 * typically (UNIX and AD) the user i 1129 struct sysdb_attrs *user; local [all...] |
| /sssd-io/src/providers/simple/ |
| H A D | simple_access_check.c | 27 #define NON_EXIST_USR_ALLOW "The user %s does not exist. Possible typo in simple_allow_users.\n" 28 #define NON_EXIST_USR_DENY "The user %s does not exist. Possible typo in simple_deny_users.\n" 55 /* First, check whether the user is in the allowed users list */ 78 * We need to make sure none of the user's groups 95 /* Next check whether this user has been specifically denied */ 434 struct ldb_message *user; local 447 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username); 452 DEBUG(SSSDBG_CRIT_FAILURE, "Invalid user %s!\n", username); 458 &user); 460 DEBUG(SSSDBG_MINOR_FAILURE, "No such user [all...] |
| /sssd-io/src/tests/cmocka/ |
| H A D | test_krb5_wait_queue.c | 34 const char *user; member in struct:krb5_mocked_auth_state 63 state->user = sss_mock_ptr_type(const char *); 90 DEBUG(SSSDBG_TRACE_LIBS, "Finished auth request of %s\n", state->user); 169 test_ctx->pd->user = discard_const(username);
|
| H A D | test_sdap_initgr.c | 214 struct passwd *user, 222 user->pw_name, 228 /* Prime the cache with a valid user */ 231 user->pw_passwd, 232 user->pw_uid, 233 user->pw_gid, 234 user->pw_gecos, 235 user->pw_dir, 236 user->pw_shell, 212 store_user(TALLOC_CTX *ctx, struct sss_domain_info *dom, struct passwd *user, struct sysdb_attrs *attrs, time_t cache_update) argument
|
| /sssd-io/src/tests/ |
| H A D | ipa_hbac-tests.c | 54 /* These don't make sense for a user/group/service but they do the job and 110 struct hbac_request_element **user) 131 *user = new_user; 202 get_test_user(eval_req, &eval_req->user); 250 get_test_user(eval_req, &eval_req->user); 260 /* Modify the rule to allow only a specific user */ 261 rules[0]->name = talloc_strdup(rules[0], "Allow user"); 328 get_test_user(eval_req, &eval_req->user); 333 eval_req->user->name = (const char *) &user_utf8_lowcase; 343 rules[0]->name = talloc_strdup(rules[0], "Allow user"); 109 get_test_user(TALLOC_CTX *mem_ctx, struct hbac_request_element **user) argument [all...] |
| H A D | krb5_child-test.c | 158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, argument 170 pd->user = talloc_strdup(pd, user); 171 if (!pd->user) goto fail; 188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, argument 201 pwd = getpwnam(user); 204 "Cannot get info on user [%s]\n", user); 219 kr->pd = create_dummy_pam_data(kr, user, password); 226 ret = krb5_get_simple_upn(kr, kr->krb5_ctx, NULL, kr->pd->user, NUL [all...] |
| /sssd-io/src/providers/ |
| H A D | data_provider.h | 79 * @param DBUS_TYPE_STRING Remote user, this value is send by the PAM client 162 char *user; member in struct:pam_data
|
| /sssd-io/src/responder/ifp/ |
| H A D | ifp_users.c | 135 "user [%d]: %s\n", ret, sss_strerror(ret)); 204 "user [%d]: %s\n", ret, sss_strerror(ret)); 292 "user [%d]: %s\n", ret, sss_strerror(ret)); 299 "More than one user found. " 403 "Failed to fetch user [%d]: %s\n", 589 "Failed to fetch user [%d]: %s\n", 664 "Failed to fetch user [%d]: %s\n", 703 /* If no name was given check if there is only one user mapped to the 718 "More than one user found. " 726 * user foun 1148 struct ldb_message *user; local 1269 struct ldb_message *user; local 1398 struct ldb_message **user; local 1528 struct ldb_message *user; local 1547 struct ldb_message *user; local [all...] |