Searched defs:user (Results 1 - 25 of 36) sorted by relevance

12

/sssd/src/tests/intg/
H A Dldap_ent.py21 def user(base_dn, uid, uidNumber, gidNumber, function
29 Generate an RFC2307(bis) user add-modlist for passing to ldap.add*
33 user = (
53 user[1].append(('gecos', [gecos]))
54 return user
118 """Add an RFC2307(bis) user add-modlist."""
119 self.append(user(base_dn or self.base_dn,
H A Dsssd_ldb.py30 user = 1 variable in class:TsCacheEntry
65 if entry_type == TsCacheEntry.user:
/sssd/src/sss_client/
H A Dpam_test_client.c54 char *user; local
59 fprintf(stderr, "missing action and user name, using default\n");
61 user = strdup("dummy");
63 fprintf(stdout, "using first argument as action and default user name\n");
65 user = strdup("dummy");
68 user = strdup(argv[2]);
71 if (action == NULL || user == NULL) {
76 fprintf(stdout, "action: %s\nuser: %s\n", action,user);
78 ret = pam_start("sss_test", user, &conv, &pamh);
H A Dnss_compat.h45 const char *user; member in struct:__netgrent::__anon31::__anon32
H A Dnss_group.c274 enum nss_status _nss_sss_initgroups_dyn(const char *user, gid_t group, argument
289 ret = sss_strnlen(user, SSS_NAME_MAX, &user_len);
295 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
315 rd.data = user;
320 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
/sssd/src/responder/common/cache_req/plugins/
H A Dcache_req_initgroups_by_name.c120 struct ldb_result *user; local
144 cr->data->name.lookup, &user);
145 if (ret != EOK || user == NULL || user->count != 1) {
146 /* Case where the user is not found has been already handled. If
149 "Unable to match initgroups user [%d]: %s\n",
154 name = ldb_msg_find_attr_as_string(user->msgs[0], SYSDB_NAME, NULL);
155 talloc_free(user);
/sssd/src/sss_client/libwbclient/
H A Dwbc_pam_sssd.c96 /* Trigger an extended logoff notification to Winbind for a specific user */
103 /* Trigger a logoff notification to Winbind for a specific user */
111 /* Change a password for a user with more detailed information upon failure */
128 /* Change a password for a user */
167 /* Authenticate a user with cached credentials */
179 /* Authenticate a user with cached credentials */
180 wbcErr wbcCredentialSave(const char *user, const char *password) argument
/sssd/src/providers/krb5/
H A Dkrb5_auth.h68 const char *user; member in struct:krb5child_req
H A Dkrb5_utils.c36 struct sss_domain_info *dom, const char *user,
42 if (krb5_ctx == NULL || dom == NULL || user == NULL || _upn == NULL) {
60 ret = krb5_get_simple_upn(mem_ctx, krb5_ctx, dom, user,
81 const char *user,
94 if (sysdb == NULL || user == NULL || upn == NULL) {
104 ret = sysdb_get_user_attr(tmp_ctx, domain, user, attrs, &res);
111 DEBUG(SSSDBG_OP_FAILURE, "[%d] user objects for name [%s] found, " \
112 "expected 1.\n", res->count, user);
139 "for user [%s].\n",
142 upn, user);
34 find_or_guess_upn(TALLOC_CTX *mem_ctx, struct ldb_message *msg, struct krb5_ctx *krb5_ctx, struct sss_domain_info *dom, const char *user, const char *user_dom, char **_upn) argument
79 check_if_cached_upn_needs_update(struct sysdb_ctx *sysdb, struct sss_domain_info *domain, const char *user, const char *upn) argument
[all...]
/sssd/src/util/
H A Dsss_selinux.c51 struct sysdb_attrs *user,
73 /* Search for user and host related elements */
86 if (user) {
87 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_DN, &dn);
92 ret = sysdb_attrs_get_el(user, SYSDB_ORIG_MEMBEROF, &memberof);
101 * The rule won't match if user category != "all" and user map doesn't
102 * contain neither user nor any of his groups in memberUser attribute
150 * The rule won't match if host category != "all" and user map doesn't
50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
/sssd/src/lib/ipa_hbac/
H A Dipa_hbac.h33 * a particular user login attempt.
135 * - Users: user groups (POSIX or non-POSIX)
193 * - Users: user groups (POSIX or non-POSIX)
213 /** This is a list of user DNs to check,
214 * it must consist of the actual user
216 * containing that user.
218 struct hbac_request_element *user; member in struct:hbac_eval_req
279 * @param[in] hbac_req A user authorization request
/sssd/src/providers/ldap/
H A Dldap_id_cleanup.c173 struct ldb_message *user);
229 DEBUG(SSSDBG_FUNC_DATA, "Found %zu expired user entries!\n", count);
253 DEBUG(SSSDBG_TRACE_ALL, "Processing user %s\n", name);
258 /* If the user is logged in, proceed to the next one */
265 "Cannot check if user is logged in: %d\n", ret);
271 DEBUG(SSSDBG_TRACE_ALL, "About to delete user %s\n", name);
278 /* Mark all groups of which user was a member as expired in cache,
296 struct ldb_message *user)
307 memberof_el = ldb_msg_find_element(user, SYSDB_MEMBEROF);
295 expire_memberof_target_groups(struct sss_domain_info *dom, struct ldb_message *user) argument
H A Dsdap_async_users.c149 DEBUG(SSSDBG_TRACE_FUNC, "Save user\n");
175 DEBUG(SSSDBG_TRACE_ALL, "objectSID: not available for user\n");
207 DEBUG(SSSDBG_OP_FAILURE, "Failed to get user name\n");
210 DEBUG(SSSDBG_TRACE_FUNC, "Processing user %s\n", user_name);
238 /* Fall back to the user's full name */
267 "unix ID to user [%s].\n", user_name);
273 "Mapping user [%s] objectSID [%s] to unix ID\n", user_name, sid_str);
275 /* Convert the SID into a UNIX user ID */
329 * typically (Unix and AD) the user is not listed in his primary
454 * 'user\
981 struct sysdb_attrs *user; local
[all...]
/sssd/src/providers/simple/
H A Dsimple_access_check.c27 #define NON_EXIST_USR_ALLOW "The user %s does not exist. Possible typo in simple_allow_users.\n"
28 #define NON_EXIST_USR_DENY "The user %s does not exist. Possible typo in simple_deny_users.\n"
55 /* First, check whether the user is in the allowed users list */
75 * We need to make sure none of the user's groups
92 /* Next check whether this user has been specifically denied */
423 struct ldb_message *user; local
436 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username);
441 DEBUG(SSSDBG_CRIT_FAILURE, "Invalid user %s!\n", username);
447 &user);
449 DEBUG(SSSDBG_MINOR_FAILURE, "No such user
[all...]
/sssd/src/responder/nss/
H A Dnsssrv.c331 const char *user,
340 user, domain);
342 nss_update_initgr_memcache(nctx, user, domain, num_groups, groups);
329 nss_memorycache_update_initgroups(struct sbus_request *sbus_req, void *data, const char *user, const char *domain, uint32_t *groups, int num_groups) argument
/sssd/src/tests/cmocka/
H A Dtest_krb5_wait_queue.c34 const char *user; member in struct:krb5_mocked_auth_state
63 state->user = sss_mock_ptr_type(const char *);
90 DEBUG(SSSDBG_TRACE_LIBS, "Finished auth request of %s\n", state->user);
169 test_ctx->pd->user = discard_const(username);
/sssd/src/tests/
H A Dipa_hbac-tests.c54 /* These don't make sense for a user/group/service but they do the job and
110 struct hbac_request_element **user)
131 *user = new_user;
202 get_test_user(eval_req, &eval_req->user);
250 get_test_user(eval_req, &eval_req->user);
260 /* Modify the rule to allow only a specific user */
261 rules[0]->name = talloc_strdup(rules[0], "Allow user");
328 get_test_user(eval_req, &eval_req->user);
333 eval_req->user->name = (const char *) &user_utf8_lowcase;
343 rules[0]->name = talloc_strdup(rules[0], "Allow user");
109 get_test_user(TALLOC_CTX *mem_ctx, struct hbac_request_element **user) argument
[all...]
H A Dkrb5_child-test.c158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, argument
170 pd->user = talloc_strdup(pd, user);
171 if (!pd->user) goto fail;
188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, argument
201 pwd = getpwnam(user);
204 "Cannot get info on user [%s]\n", user);
214 kr->pd = create_dummy_pam_data(kr, user, password);
216 ret = krb5_get_simple_upn(kr, kr->krb5_ctx, NULL, kr->pd->user, NUL
[all...]
/sssd/src/responder/ifp/
H A Difp_users.c132 "user [%d]: %s\n", ret, sss_strerror(ret));
202 "user [%d]: %s\n", ret, sss_strerror(ret));
287 "user [%d]: %s\n", ret, sss_strerror(ret));
538 DEBUG(SSSDBG_CRIT_FAILURE, "Unable to lookup user %u@%s [%d]: %s\n",
672 struct ldb_message *user; local
681 ret = ifp_users_user_get(sbus_req, data, NULL, &domain, &user);
686 username = ldb_msg_find_attr_as_string(user, SYSDB_NAME, NULL);
721 "user [%d]: %s\n", ret, sss_strerror(ret));
792 struct ldb_message *user; local
815 ret = ifp_users_user_get(sbus_req, ifp_ctx, NULL, &domain, &user);
873 struct ldb_message **user; local
998 struct ldb_message *user; local
1017 struct ldb_message *user; local
[all...]
/sssd/src/providers/
H A Ddata_provider.h79 * @param DBUS_TYPE_STRING Remote user, this value is send by the PAM client
166 char *user; member in struct:pam_data
/sssd/src/tools/
H A Dsss_cache.c89 char *user; member in struct:input_values
240 free(values->user);
352 /* Update user filter */
436 type_string = "user";
661 { "user", 'u', POPT_ARG_STRING, &(values.user), 0,
662 _("Invalidate particular user"), NULL },
756 if (idb == INVALIDATE_NONE && !values.user && !values.group &&
777 } else if (values.user) {
778 ctx->user_name = talloc_strdup(ctx, values.user);
[all...]
/sssd/src/db/
H A Dsysdb_search.c702 /* see if this is a user to convert to a group */
1465 /* Skip user entry because it already has override values added */
1643 char *user = NULL; local
1703 /* Copy the user string */
1704 user = talloc_strndup(tmp_ctx, p_user, len);
1705 if (!user) {
1749 if (user) {
1750 *username = talloc_steal(mem_ctx, user);
2139 DEBUG(SSSDBG_OP_FAILURE, "Cannot find user [%s] in cache\n",
2154 DEBUG(SSSDBG_CRIT_FAILURE, "A user wit
[all...]
H A Dsysdb_upgrade.c138 * change it into a member attribute for a user of same domain.
1040 struct ldb_message *user; local
1044 const char *filter = "(&(objectClass=user)(!(uidNumber=*))(memberOf=*))";
1078 user = res->msgs[i];
1079 memberof_el = ldb_msg_find_element(user, "memberof");
1080 name = ldb_msg_find_attr_as_string(user, "name", NULL);
1127 /* If we failed adding the ghost user(s) because the values already
1166 DEBUG(SSSDBG_TRACE_FUNC, "Removing fake user [%s]\n",
1167 ldb_dn_get_linearized(user->dn));
1169 ret = ldb_delete(sysdb->ldb, user
[all...]
/sssd/src/providers/ipa/
H A Dipa_selinux.c59 struct sysdb_attrs *user,
78 struct sysdb_attrs *user,
107 DEBUG(SSSDBG_OP_FAILURE, "Failed to store user map %d. "
145 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user,
156 struct sysdb_attrs *user,
194 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) {
228 ret = ipa_selinux_process_seealso_maps(user, host,
245 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, argument
283 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) {
302 "attributes to SELinux user ma
155 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument
840 struct sysdb_attrs *user; member in struct:ipa_get_selinux_state
854 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument
1333 struct sysdb_attrs *user = NULL; local
1445 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument
1509 struct sysdb_attrs *user; member in struct:ipa_selinux_handler_state
[all...]
/sssd/src/responder/pam/
H A Dpamsrv_cmd.c213 DEBUG(SSSDBG_CRIT_FAILURE, "A user with no name?\n");
217 if (strcmp(pd->user, name)) {
219 talloc_free(pd->user);
220 pd->user = talloc_strdup(pd, name);
221 if (!pd->user) return ENOMEM;
389 /* user name */
456 ret = sysdb_set_user_attr(preq->domain, preq->pd->user, attrs,
755 pd->user, password,
796 pd->user);
963 "talloc_size failed, cannot prepare user inf
1863 pam_is_last_online_login_fresh(struct sss_domain_info *domain, const char* user, int cached_auth_timeout, bool *_result) argument
1920 pam_can_user_cache_auth(struct sss_domain_info *domain, int pam_cmd, struct sss_auth_token *authtok, const char* user, bool cached_auth_failed) argument
[all...]

Completed in 6314 milliseconds

12