Searched defs:user (Results 1 - 25 of 41) sorted by relevance

12

/sssd-io/src/tests/intg/
H A Dldap_ent.py21 def user(base_dn, uid, uidNumber, gidNumber, function
29 Generate an RFC2307(bis) user add-modlist for passing to ldap.add*
33 user = (
53 user[1].append(('gecos', [gecos.encode('utf-8')]))
54 return user
122 """Add an RFC2307(bis) user add-modlist."""
123 self.append(user(base_dn or self.base_dn,
H A Dsssd_ldb.py31 user = 1 variable in class:TsCacheEntry
66 if entry_type == TsCacheEntry.user:
/sssd-io/src/sss_client/
H A Dnss_compat.h45 const char *user; member in struct:__netgrent::__anon41::__anon42
H A Dnss_group.c270 enum nss_status _nss_sss_initgroups_dyn(const char *user, gid_t group, argument
285 ret = sss_strnlen(user, SSS_NAME_MAX, &user_len);
291 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
311 rd.data = user;
316 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
/sssd-io/src/responder/nss/
H A Dnss_protocol_netgr.c31 struct sized_string user; local
38 to_sized_string(&user, entry->value.triple.username);
46 if (user.len == 0) {
47 user.len = 1;
48 user.str = "";
57 + host.len + user.len + domain.len);
67 SAFEALIGN_SET_STRING(&body[*_rp], user.str, user.len, _rp);
H A Dnss_iface.c79 /* The user is gone. Invalidate the mc record */
90 /* we skip the first entry, it's the user itself */
186 const char *user,
195 user, domain);
197 nss_update_initgr_memcache(nctx, user, domain, num_groups, groups);
184 nss_memorycache_update_initgroups(struct sbus_request *sbus_req, void *data, const char *user, const char *domain, uint32_t *groups, int num_groups) argument
H A Dnss_protocol_grent.c318 struct ldb_message *user; local
346 user = result->msgs[0];
347 gid = sss_view_ldb_msg_find_attr_as_uint64(domain, user, SYSDB_GIDNUM, 0);
348 orig_gid = sss_view_ldb_msg_find_attr_as_uint64(domain, user,
356 /* First message is user, skip it. */
379 /* Do not add the GID of the original primary group if the user is
/sssd-io/src/sss_client/libwbclient/
H A Dwbc_pam_sssd.c96 /* Trigger an extended logoff notification to Winbind for a specific user */
103 /* Trigger a logoff notification to Winbind for a specific user */
111 /* Change a password for a user with more detailed information upon failure */
128 /* Change a password for a user */
167 /* Authenticate a user with cached credentials */
179 /* Authenticate a user with cached credentials */
180 wbcErr wbcCredentialSave(const char *user, const char *password) argument
/sssd-io/src/providers/ipa/
H A Dipa_deskprofile_rules.c65 char *user; local
162 ret = sss_parse_internal_fqname(state, username, &user, NULL);
171 IPA_MEMBER_USER, user);
H A Dipa_deskprofile_rules_util.c52 * 1 = user, group, host, hostgroup
53 * 2 = user, group, hostgroup, host
54 * 3 = user, host, group, hostgroup
55 * 4 = user, host, hostgroup, group
56 * 5 = user, hostgroup, group, host
57 * 6 = user, hostgroup, host, group
58 * 7 = group, user, host, hostgroup
59 * 8 = group, user, hostgroup, host
60 * 9 = group, host, user, hostgroup
61 * 10 = group, host, hostgroup, user
357 bool user = false; local
[all...]
/sssd-io/src/providers/krb5/
H A Dkrb5_auth.h70 const char *user; member in struct:krb5child_req
H A Dkrb5_utils.c36 struct sss_domain_info *dom, const char *user,
42 if (krb5_ctx == NULL || dom == NULL || user == NULL || _upn == NULL) {
60 ret = krb5_get_simple_upn(mem_ctx, krb5_ctx, dom, user,
81 const char *user,
94 if (sysdb == NULL || user == NULL || upn == NULL) {
104 ret = sysdb_get_user_attr(tmp_ctx, domain, user, attrs, &res);
111 DEBUG(SSSDBG_OP_FAILURE, "[%d] user objects for name [%s] found, " \
112 "expected 1.\n", res->count, user);
139 "for user [%s].\n",
142 upn, user);
34 find_or_guess_upn(TALLOC_CTX *mem_ctx, struct ldb_message *msg, struct krb5_ctx *krb5_ctx, struct sss_domain_info *dom, const char *user, const char *user_dom, char **_upn) argument
79 check_if_cached_upn_needs_update(struct sysdb_ctx *sysdb, struct sss_domain_info *domain, const char *user, const char *upn) argument
[all...]
/sssd-io/src/responder/common/cache_req/plugins/
H A Dcache_req_initgroups_by_name.c120 struct ldb_result *user; local
144 cr->data->name.lookup, &user);
145 if (ret != EOK || user == NULL || user->count != 1) {
146 /* Case where the user is not found has been already handled. If
149 "Unable to match initgroups user [%d]: %s\n",
154 name = ldb_msg_find_attr_as_string(user->msgs[0], SYSDB_NAME, NULL);
157 talloc_free(user);
165 talloc_free(user);
/sssd-io/src/tools/sssctl/
H A Dsssctl_user_checks.c67 static int get_ifp_user(const char *user) argument
95 error = sss_sifp_fetch_user_by_name(sifp, user, &user_obj);
97 fprintf(stderr, _("Unable to get user object"));
101 fprintf(stdout, _("SSSD InfoPipe user lookup result:\n"));
113 fprintf(stderr, _("Unable to get user name attr"));
131 static int sss_getpwnam_check(const char *user) argument
166 status = sss_getpwnam_r(user, &pwd, buffer, buflen, &nss_errno);
173 fprintf(stdout, _("SSSD nss user lookup result:\n"));
174 fprintf(stdout, _(" - user name: %s\n"), pwd.pw_name);
175 fprintf(stdout, _(" - user i
199 const char *user = NULL; local
[all...]
/sssd-io/src/util/
H A Dsss_selinux.c51 struct sysdb_attrs *user,
73 /* Search for user and host related elements */
86 if (user) {
87 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_DN, &dn);
92 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_MEMBEROF, &memberof);
101 * The rule won't match if user category != "all" and user map doesn't
102 * contain neither user nor any of his groups in memberUser attribute
150 * The rule won't match if host category != "all" and user map doesn't
50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
/sssd-io/src/lib/ipa_hbac/
H A Dipa_hbac.h33 * a particular user login attempt.
135 * - Users: user groups (POSIX or non-POSIX)
193 * - Users: user groups (POSIX or non-POSIX)
213 /** This is a list of user DNs to check,
214 * it must consist of the actual user
216 * containing that user.
218 struct hbac_request_element *user; member in struct:hbac_eval_req
279 * @param[in] hbac_req A user authorization request
/sssd-io/src/providers/ldap/
H A Dldap_id_cleanup.c173 struct ldb_message *user);
230 DEBUG(SSSDBG_FUNC_DATA, "Found %zu expired user entries!\n", count);
254 DEBUG(SSSDBG_TRACE_ALL, "Processing user %s\n", name);
259 /* If the user is logged in, proceed to the next one */
266 "Cannot check if user is logged in: %d\n", ret);
272 DEBUG(SSSDBG_TRACE_ALL, "About to delete user %s\n", name);
279 /* Mark all groups of which user was a member as expired in cache,
297 struct ldb_message *user)
308 memberof_el = ldb_msg_find_element(user, SYSDB_MEMBEROF);
296 expire_memberof_target_groups(struct sss_domain_info *dom, struct ldb_message *user) argument
H A Dsdap_async_users.c207 DEBUG(SSSDBG_TRACE_FUNC, "Save user\n");
233 DEBUG(SSSDBG_TRACE_ALL, "objectSID: not available for user\n");
265 DEBUG(SSSDBG_OP_FAILURE, "Failed to get user name\n");
268 DEBUG(SSSDBG_TRACE_FUNC, "Processing user %s\n", user_name);
296 /* Fall back to the user's full name */
325 "unix ID to user [%s].\n", user_name);
331 "Mapping user [%s] objectSID [%s] to unix ID\n", user_name, sid_str);
333 /* Convert the SID into a UNIX user ID */
373 /* check that the uid is valid for this domain if the user is a POSIX one */
397 * typically (UNIX and AD) the user i
1129 struct sysdb_attrs *user; local
[all...]
/sssd-io/src/providers/simple/
H A Dsimple_access_check.c27 #define NON_EXIST_USR_ALLOW "The user %s does not exist. Possible typo in simple_allow_users.\n"
28 #define NON_EXIST_USR_DENY "The user %s does not exist. Possible typo in simple_deny_users.\n"
55 /* First, check whether the user is in the allowed users list */
78 * We need to make sure none of the user's groups
95 /* Next check whether this user has been specifically denied */
434 struct ldb_message *user; local
447 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username);
452 DEBUG(SSSDBG_CRIT_FAILURE, "Invalid user %s!\n", username);
458 &user);
460 DEBUG(SSSDBG_MINOR_FAILURE, "No such user
[all...]
/sssd-io/src/tests/cmocka/
H A Dtest_krb5_wait_queue.c34 const char *user; member in struct:krb5_mocked_auth_state
63 state->user = sss_mock_ptr_type(const char *);
90 DEBUG(SSSDBG_TRACE_LIBS, "Finished auth request of %s\n", state->user);
169 test_ctx->pd->user = discard_const(username);
H A Dtest_sdap_initgr.c214 struct passwd *user,
222 user->pw_name,
228 /* Prime the cache with a valid user */
231 user->pw_passwd,
232 user->pw_uid,
233 user->pw_gid,
234 user->pw_gecos,
235 user->pw_dir,
236 user->pw_shell,
212 store_user(TALLOC_CTX *ctx, struct sss_domain_info *dom, struct passwd *user, struct sysdb_attrs *attrs, time_t cache_update) argument
/sssd-io/src/tests/
H A Dipa_hbac-tests.c54 /* These don't make sense for a user/group/service but they do the job and
110 struct hbac_request_element **user)
131 *user = new_user;
202 get_test_user(eval_req, &eval_req->user);
250 get_test_user(eval_req, &eval_req->user);
260 /* Modify the rule to allow only a specific user */
261 rules[0]->name = talloc_strdup(rules[0], "Allow user");
328 get_test_user(eval_req, &eval_req->user);
333 eval_req->user->name = (const char *) &user_utf8_lowcase;
343 rules[0]->name = talloc_strdup(rules[0], "Allow user");
109 get_test_user(TALLOC_CTX *mem_ctx, struct hbac_request_element **user) argument
[all...]
H A Dkrb5_child-test.c158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, argument
170 pd->user = talloc_strdup(pd, user);
171 if (!pd->user) goto fail;
188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, argument
201 pwd = getpwnam(user);
204 "Cannot get info on user [%s]\n", user);
219 kr->pd = create_dummy_pam_data(kr, user, password);
226 ret = krb5_get_simple_upn(kr, kr->krb5_ctx, NULL, kr->pd->user, NUL
[all...]
/sssd-io/src/providers/
H A Ddata_provider.h79 * @param DBUS_TYPE_STRING Remote user, this value is send by the PAM client
162 char *user; member in struct:pam_data
/sssd-io/src/responder/ifp/
H A Difp_users.c135 "user [%d]: %s\n", ret, sss_strerror(ret));
204 "user [%d]: %s\n", ret, sss_strerror(ret));
292 "user [%d]: %s\n", ret, sss_strerror(ret));
299 "More than one user found. "
403 "Failed to fetch user [%d]: %s\n",
589 "Failed to fetch user [%d]: %s\n",
664 "Failed to fetch user [%d]: %s\n",
703 /* If no name was given check if there is only one user mapped to the
718 "More than one user found. "
726 * user foun
1148 struct ldb_message *user; local
1269 struct ldb_message *user; local
1398 struct ldb_message **user; local
1528 struct ldb_message *user; local
1547 struct ldb_message *user; local
[all...]

Completed in 85 milliseconds

12