/sssd/src/tests/intg/ |
H A D | ldap_ent.py | 21 def user(base_dn, uid, uidNumber, gidNumber, function 29 Generate an RFC2307(bis) user add-modlist for passing to ldap.add* 33 user = ( 53 user[1].append(('gecos', [gecos])) 54 return user 118 """Add an RFC2307(bis) user add-modlist.""" 119 self.append(user(base_dn or self.base_dn,
|
H A D | sssd_ldb.py | 30 user = 1 variable in class:TsCacheEntry 65 if entry_type == TsCacheEntry.user:
|
/sssd/src/sss_client/ |
H A D | pam_test_client.c | 54 char *user; local 59 fprintf(stderr, "missing action and user name, using default\n"); 61 user = strdup("dummy"); 63 fprintf(stdout, "using first argument as action and default user name\n"); 65 user = strdup("dummy"); 68 user = strdup(argv[2]); 71 if (action == NULL || user == NULL) { 76 fprintf(stdout, "action: %s\nuser: %s\n", action,user); 78 ret = pam_start("sss_test", user, &conv, &pamh);
|
H A D | nss_compat.h | 45 const char *user; member in struct:__netgrent::__anon31::__anon32
|
H A D | nss_group.c | 274 enum nss_status _nss_sss_initgroups_dyn(const char *user, gid_t group, argument 289 ret = sss_strnlen(user, SSS_NAME_MAX, &user_len); 295 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size, 315 rd.data = user; 320 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
|
/sssd/src/responder/common/cache_req/plugins/ |
H A D | cache_req_initgroups_by_name.c | 120 struct ldb_result *user; local 144 cr->data->name.lookup, &user); 145 if (ret != EOK || user == NULL || user->count != 1) { 146 /* Case where the user is not found has been already handled. If 149 "Unable to match initgroups user [%d]: %s\n", 154 name = ldb_msg_find_attr_as_string(user->msgs[0], SYSDB_NAME, NULL); 155 talloc_free(user);
|
/sssd/src/sss_client/libwbclient/ |
H A D | wbc_pam_sssd.c | 96 /* Trigger an extended logoff notification to Winbind for a specific user */ 103 /* Trigger a logoff notification to Winbind for a specific user */ 111 /* Change a password for a user with more detailed information upon failure */ 128 /* Change a password for a user */ 167 /* Authenticate a user with cached credentials */ 179 /* Authenticate a user with cached credentials */ 180 wbcErr wbcCredentialSave(const char *user, const char *password) argument
|
/sssd/src/providers/krb5/ |
H A D | krb5_auth.h | 68 const char *user; member in struct:krb5child_req
|
H A D | krb5_utils.c | 36 struct sss_domain_info *dom, const char *user, 42 if (krb5_ctx == NULL || dom == NULL || user == NULL || _upn == NULL) { 60 ret = krb5_get_simple_upn(mem_ctx, krb5_ctx, dom, user, 81 const char *user, 94 if (sysdb == NULL || user == NULL || upn == NULL) { 104 ret = sysdb_get_user_attr(tmp_ctx, domain, user, attrs, &res); 111 DEBUG(SSSDBG_OP_FAILURE, "[%d] user objects for name [%s] found, " \ 112 "expected 1.\n", res->count, user); 139 "for user [%s].\n", 142 upn, user); 34 find_or_guess_upn(TALLOC_CTX *mem_ctx, struct ldb_message *msg, struct krb5_ctx *krb5_ctx, struct sss_domain_info *dom, const char *user, const char *user_dom, char **_upn) argument 79 check_if_cached_upn_needs_update(struct sysdb_ctx *sysdb, struct sss_domain_info *domain, const char *user, const char *upn) argument [all...] |
/sssd/src/util/ |
H A D | sss_selinux.c | 51 struct sysdb_attrs *user, 73 /* Search for user and host related elements */ 86 if (user) { 87 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_DN, &dn); 92 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_MEMBEROF, &memberof); 101 * The rule won't match if user category != "all" and user map doesn't 102 * contain neither user nor any of his groups in memberUser attribute 150 * The rule won't match if host category != "all" and user map doesn't 50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
|
/sssd/src/lib/ipa_hbac/ |
H A D | ipa_hbac.h | 33 * a particular user login attempt. 135 * - Users: user groups (POSIX or non-POSIX) 193 * - Users: user groups (POSIX or non-POSIX) 213 /** This is a list of user DNs to check, 214 * it must consist of the actual user 216 * containing that user. 218 struct hbac_request_element *user; member in struct:hbac_eval_req 279 * @param[in] hbac_req A user authorization request
|
/sssd/src/providers/ldap/ |
H A D | ldap_id_cleanup.c | 173 struct ldb_message *user); 229 DEBUG(SSSDBG_FUNC_DATA, "Found %zu expired user entries!\n", count); 253 DEBUG(SSSDBG_TRACE_ALL, "Processing user %s\n", name); 258 /* If the user is logged in, proceed to the next one */ 265 "Cannot check if user is logged in: %d\n", ret); 271 DEBUG(SSSDBG_TRACE_ALL, "About to delete user %s\n", name); 278 /* Mark all groups of which user was a member as expired in cache, 296 struct ldb_message *user) 307 memberof_el = ldb_msg_find_element(user, SYSDB_MEMBEROF); 295 expire_memberof_target_groups(struct sss_domain_info *dom, struct ldb_message *user) argument
|
H A D | sdap_async_users.c | 149 DEBUG(SSSDBG_TRACE_FUNC, "Save user\n"); 175 DEBUG(SSSDBG_TRACE_ALL, "objectSID: not available for user\n"); 207 DEBUG(SSSDBG_OP_FAILURE, "Failed to get user name\n"); 210 DEBUG(SSSDBG_TRACE_FUNC, "Processing user %s\n", user_name); 238 /* Fall back to the user's full name */ 267 "unix ID to user [%s].\n", user_name); 273 "Mapping user [%s] objectSID [%s] to unix ID\n", user_name, sid_str); 275 /* Convert the SID into a UNIX user ID */ 329 * typically (Unix and AD) the user is not listed in his primary 454 * 'user\ 981 struct sysdb_attrs *user; local [all...] |
/sssd/src/providers/simple/ |
H A D | simple_access_check.c | 27 #define NON_EXIST_USR_ALLOW "The user %s does not exist. Possible typo in simple_allow_users.\n" 28 #define NON_EXIST_USR_DENY "The user %s does not exist. Possible typo in simple_deny_users.\n" 55 /* First, check whether the user is in the allowed users list */ 75 * We need to make sure none of the user's groups 92 /* Next check whether this user has been specifically denied */ 423 struct ldb_message *user; local 436 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username); 441 DEBUG(SSSDBG_CRIT_FAILURE, "Invalid user %s!\n", username); 447 &user); 449 DEBUG(SSSDBG_MINOR_FAILURE, "No such user [all...] |
/sssd/src/responder/nss/ |
H A D | nsssrv.c | 331 const char *user, 340 user, domain); 342 nss_update_initgr_memcache(nctx, user, domain, num_groups, groups); 329 nss_memorycache_update_initgroups(struct sbus_request *sbus_req, void *data, const char *user, const char *domain, uint32_t *groups, int num_groups) argument
|
/sssd/src/tests/cmocka/ |
H A D | test_krb5_wait_queue.c | 34 const char *user; member in struct:krb5_mocked_auth_state 63 state->user = sss_mock_ptr_type(const char *); 90 DEBUG(SSSDBG_TRACE_LIBS, "Finished auth request of %s\n", state->user); 169 test_ctx->pd->user = discard_const(username);
|
/sssd/src/tests/ |
H A D | ipa_hbac-tests.c | 54 /* These don't make sense for a user/group/service but they do the job and 110 struct hbac_request_element **user) 131 *user = new_user; 202 get_test_user(eval_req, &eval_req->user); 250 get_test_user(eval_req, &eval_req->user); 260 /* Modify the rule to allow only a specific user */ 261 rules[0]->name = talloc_strdup(rules[0], "Allow user"); 328 get_test_user(eval_req, &eval_req->user); 333 eval_req->user->name = (const char *) &user_utf8_lowcase; 343 rules[0]->name = talloc_strdup(rules[0], "Allow user"); 109 get_test_user(TALLOC_CTX *mem_ctx, struct hbac_request_element **user) argument [all...] |
H A D | krb5_child-test.c | 158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, argument 170 pd->user = talloc_strdup(pd, user); 171 if (!pd->user) goto fail; 188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, argument 201 pwd = getpwnam(user); 204 "Cannot get info on user [%s]\n", user); 214 kr->pd = create_dummy_pam_data(kr, user, password); 216 ret = krb5_get_simple_upn(kr, kr->krb5_ctx, NULL, kr->pd->user, NUL [all...] |
/sssd/src/responder/ifp/ |
H A D | ifp_users.c | 132 "user [%d]: %s\n", ret, sss_strerror(ret)); 202 "user [%d]: %s\n", ret, sss_strerror(ret)); 287 "user [%d]: %s\n", ret, sss_strerror(ret)); 538 DEBUG(SSSDBG_CRIT_FAILURE, "Unable to lookup user %u@%s [%d]: %s\n", 672 struct ldb_message *user; local 681 ret = ifp_users_user_get(sbus_req, data, NULL, &domain, &user); 686 username = ldb_msg_find_attr_as_string(user, SYSDB_NAME, NULL); 721 "user [%d]: %s\n", ret, sss_strerror(ret)); 792 struct ldb_message *user; local 815 ret = ifp_users_user_get(sbus_req, ifp_ctx, NULL, &domain, &user); 873 struct ldb_message **user; local 998 struct ldb_message *user; local 1017 struct ldb_message *user; local [all...] |
/sssd/src/providers/ |
H A D | data_provider.h | 79 * @param DBUS_TYPE_STRING Remote user, this value is send by the PAM client 166 char *user; member in struct:pam_data
|
/sssd/src/tools/ |
H A D | sss_cache.c | 89 char *user; member in struct:input_values 240 free(values->user); 352 /* Update user filter */ 436 type_string = "user"; 661 { "user", 'u', POPT_ARG_STRING, &(values.user), 0, 662 _("Invalidate particular user"), NULL }, 756 if (idb == INVALIDATE_NONE && !values.user && !values.group && 777 } else if (values.user) { 778 ctx->user_name = talloc_strdup(ctx, values.user); [all...] |
/sssd/src/db/ |
H A D | sysdb_search.c | 702 /* see if this is a user to convert to a group */ 1465 /* Skip user entry because it already has override values added */ 1643 char *user = NULL; local 1703 /* Copy the user string */ 1704 user = talloc_strndup(tmp_ctx, p_user, len); 1705 if (!user) { 1749 if (user) { 1750 *username = talloc_steal(mem_ctx, user); 2139 DEBUG(SSSDBG_OP_FAILURE, "Cannot find user [%s] in cache\n", 2154 DEBUG(SSSDBG_CRIT_FAILURE, "A user wit [all...] |
H A D | sysdb_upgrade.c | 138 * change it into a member attribute for a user of same domain. 1040 struct ldb_message *user; local 1044 const char *filter = "(&(objectClass=user)(!(uidNumber=*))(memberOf=*))"; 1078 user = res->msgs[i]; 1079 memberof_el = ldb_msg_find_element(user, "memberof"); 1080 name = ldb_msg_find_attr_as_string(user, "name", NULL); 1127 /* If we failed adding the ghost user(s) because the values already 1166 DEBUG(SSSDBG_TRACE_FUNC, "Removing fake user [%s]\n", 1167 ldb_dn_get_linearized(user->dn)); 1169 ret = ldb_delete(sysdb->ldb, user [all...] |
/sssd/src/providers/ipa/ |
H A D | ipa_selinux.c | 59 struct sysdb_attrs *user, 78 struct sysdb_attrs *user, 107 DEBUG(SSSDBG_OP_FAILURE, "Failed to store user map %d. " 145 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, 156 struct sysdb_attrs *user, 194 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) { 228 ret = ipa_selinux_process_seealso_maps(user, host, 245 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, argument 283 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) { 302 "attributes to SELinux user ma 155 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument 840 struct sysdb_attrs *user; member in struct:ipa_get_selinux_state 854 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument 1333 struct sysdb_attrs *user = NULL; local 1445 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument 1509 struct sysdb_attrs *user; member in struct:ipa_selinux_handler_state [all...] |
/sssd/src/responder/pam/ |
H A D | pamsrv_cmd.c | 213 DEBUG(SSSDBG_CRIT_FAILURE, "A user with no name?\n"); 217 if (strcmp(pd->user, name)) { 219 talloc_free(pd->user); 220 pd->user = talloc_strdup(pd, name); 221 if (!pd->user) return ENOMEM; 389 /* user name */ 456 ret = sysdb_set_user_attr(preq->domain, preq->pd->user, attrs, 755 pd->user, password, 796 pd->user); 963 "talloc_size failed, cannot prepare user inf 1863 pam_is_last_online_login_fresh(struct sss_domain_info *domain, const char* user, int cached_auth_timeout, bool *_result) argument 1920 pam_can_user_cache_auth(struct sss_domain_info *domain, int pam_cmd, struct sss_auth_token *authtok, const char* user, bool cached_auth_failed) argument [all...] |