| /sssd-io/src/util/ |
| H A D | sss_nss.h | 30 const char *username; member in struct:sss_nss_homedir_ctx
|
| H A D | sss_nss.c | 37 char *username = NULL; local 75 if (homedir_ctx->username == NULL) { 81 username = sss_output_name(tmp_ctx, homedir_ctx->username, 83 if (username == NULL) { 87 result = talloc_asprintf_append(result, "%s%s", p, username); 88 talloc_free(username); 92 if (homedir_ctx->username == NULL) { 98 username = sss_output_name(tmp_ctx, homedir_ctx->username, [all...] |
| H A D | sss_selinux.c | 192 const char *username, 218 ret = sysdb_search_user_by_name(tmp_ctx, domain, username, attrs, 190 sss_selinux_extract_user(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *username, struct sysdb_attrs **_user_attrs) argument
|
| /sssd-io/src/sss_client/sudo_testcli/ |
| H A D | sudo_testcli.c | 44 const char *username = NULL; local 50 fprintf(stderr, "Usage: sss_sudo_cli username [uid]\n"); 54 username = argv[1]; 58 passwd = getpwnam(username); 70 ret = sss_sudo_send_recv_defaults(uid, username, &error, 79 username, (unsigned long long)uid, 93 ret = sss_sudo_send_recv(uid, username, domainname, &error, &result);
|
| /sssd-io/src/responder/pam/ |
| H A D | pam_LOCAL_domain.c | 225 const char *username = NULL; local 274 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL); 275 if (strcmp(username, pd->user) != 0) { 277 "Expected username [%s] get [%s].\n", pd->user, username); 304 "user: [%s], password hash: [%s]\n", username, pwdhash); 311 "user: [%s], new hash: [%s]\n", username, new_hash);
|
| /sssd-io/src/responder/ssh/ |
| H A D | ssh_cmd.c | 40 ssh_check_non_sssd_user(const char *username) argument 44 pwd = getpwnam(username); 46 DEBUG(SSSDBG_TRACE_ALL, "%s is a non-SSSD user\n", username);
|
| /sssd-io/src/sss_client/libwbclient/ |
| H A D | wbc_pam_sssd.c | 26 /* Authenticate a username/password pair */ 27 wbcErr wbcAuthenticateUser(const char *username, argument 33 params.account_name = username; 104 wbcErr wbcLogoffUser(const char *username, argument 129 wbcErr wbcChangeUserPassword(const char *username, argument 136 params.account_name = username;
|
| /sssd-io/src/providers/ipa/ |
| H A D | ipa_deskprofile_rules.c | 61 const char *username) 161 /* Add the username to the filter */ 162 ret = sss_parse_internal_fqname(state, username, &user, NULL); 177 /* Add all parent groups of `username` to the filter */ 178 ret = get_sysdb_grouplist(state, domain->sysdb, domain, username, 54 ipa_deskprofile_rule_info_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_handle *sh, struct sdap_options *opts, struct sdap_search_base **search_bases, struct sysdb_attrs *ipa_host, struct sss_domain_info *domain, const char *username) argument
|
| H A D | selinux_child.c | 38 const char *username; member in struct:input_buffer 79 /* username */ 81 DEBUG(SSSDBG_TRACE_INTERNAL, "username length: %d\n", len); 83 DEBUG(SSSDBG_CRIT_FAILURE, "No username set!\n"); 87 ibuf->username = talloc_strndup(ibuf, (char *)(buf + p), len); 88 if (ibuf->username == NULL) return ENOMEM; 89 DEBUG(SSSDBG_TRACE_INTERNAL, "username: %s\n", ibuf->username); 175 ret = sss_get_seuser(ibuf->username, &db_seuser, &db_mls_range); 334 ret = sc_set_seuser(ibuf->username, ibu [all...] |
| H A D | ipa_hbac_common.c | 270 const char *username, 373 const char *username, 396 ret = sss_parse_internal_fqname(tmp_ctx, username, &shortname, NULL); 423 ret = sysdb_initgroups(tmp_ctx, domain, username, &res); 433 "User [%s] not found in cache.\n", username); 443 "[%u] groups for [%s]\n", res->count - 1, username); 371 hbac_eval_user_element(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *username, struct hbac_request_element **user_element) argument
|
| H A D | ipa_session.c | 55 const char *username; member in struct:ipa_fetch_deskprofile_state 79 const char *username) 103 state->username = username; 339 state->username); 457 const char *username, 468 const char *username, /* fully-qualified */ 621 const char *username, 642 ret = sss_parse_internal_fqname(tmp_ctx, username, 646 username, re 75 ipa_fetch_deskprofile_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct ipa_session_ctx *session_ctx, const char *username) argument 619 ipa_pam_session_handler_get_deskprofile_user_info(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *username, char **_shortname, char **_domain, char **_user_dir, uid_t *_uid, gid_t *_gid) argument 697 ipa_pam_session_handler_save_deskprofile_rules( struct be_ctx *be_ctx, struct sss_domain_info *domain, const char *username, const char *user_dir, const char *hostname, uid_t uid, gid_t gid) argument [all...] |
| /sssd-io/src/providers/krb5/ |
| H A D | krb5_wait_queue.c | 177 static void check_wait_queue(struct krb5_ctx *krb5_ctx, char *username) argument 192 key.str = username; 207 "Wait queue for user [%s] is empty.\n", username); 227 username); 233 "No wait queue for user [%s] found.\n", username);
|
| /sssd-io/src/providers/data_provider/ |
| H A D | dp_target_id.c | 79 const char *username; member in struct:dp_initgr_ctx 92 const char *username; local 120 /* Copy original username */ 121 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL); 122 if (username == NULL) { 126 ctx->username = talloc_strdup(ctx, username); 127 if (ctx->username == NULL) { 172 if (ctx->username == NULL) { 193 DBUS_TYPE_STRING, &ctx->username, [all...] |
| /sssd-io/src/providers/simple/ |
| H A D | simple_access_check.c | 49 simple_check_users(struct simple_ctx *ctx, const char *username, argument 59 "Checking against allow list username [%s].\n", 71 if (sss_string_equal(domain->case_sensitive, username, 75 username); 79 * are denied. But there's no need to check username 99 "Checking against deny list username [%s].\n", 111 if (sss_string_equal(domain->case_sensitive, username, 425 const char *username) 447 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username); 449 /* get domain from username */ 422 simple_check_get_groups_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument 710 const char *username; member in struct:simple_access_check_state 717 simple_access_check_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument [all...] |
| /sssd-io/src/responder/common/ |
| H A D | responder_utils.c | 365 const char *username; local 369 username = sss_view_ldb_msg_find_attr_as_string(state->dom, 373 if (username == NULL) { 380 username,
|
| /sssd-io/src/sss_client/sudo/ |
| H A D | sss_sudo.c | 34 const char *username, 46 const char *username, 61 ret = sss_sudo_create_query(uid, username, &query_buf, &query_len); 91 const char *username, 98 if (username == NULL || strlen(username) == 0) { 104 ret = sss_sudo_send_recv_generic(SSS_SUDO_GET_SUDORULES, uid, username, 110 const char *username, 115 if (username == NULL || strlen(username) 44 sss_sudo_send_recv_generic(enum sss_cli_command command, uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument 90 sss_sudo_send_recv(uid_t uid, const char *username, const char *domainname, uint32_t *_error, struct sss_sudo_result **_result) argument 109 sss_sudo_send_recv_defaults(uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument 123 sss_sudo_create_query(uid_t uid, const char *username, uint8_t **_query, size_t *_query_len) argument [all...] |
| /sssd-io/src/tests/cmocka/ |
| H A D | test_krb5_wait_queue.c | 163 const char *username, 169 test_ctx->pd->user = discard_const(username); 171 will_return(krb5_auth_send, username); 179 const char *username) 181 return test_krb5_wait_mock(test_ctx, username, 200, 0, 0, 0); 162 test_krb5_wait_mock(struct test_krb5_wait_queue *test_ctx, const char *username, time_t us_delay, int ret, int pam_status, int dp_err) argument 178 test_krb5_wait_mock_success(struct test_krb5_wait_queue *test_ctx, const char *username) argument
|
| H A D | test_simple_access.c | 181 const char *username, 189 simple_test_ctx->pd->user = discard_const(username); 180 run_simple_access_check(struct simple_test_ctx *simple_test_ctx, const char *username, int expected_rv, bool allow_access) argument
|
| /sssd-io/src/tests/ |
| H A D | tcurl_test_tool.c | 53 const char *username; member in struct:tool_options 215 if (opts->username != NULL && opts->password != NULL) { 216 ret = tcurl_req_http_basic_auth(requests[i], opts->username, 334 { "username", '\0', POPT_ARG_STRING, &opts.username, '\0', "Username for basic authentication", NULL },
|
| /sssd-io/src/tools/ |
| H A D | tools_mc_util.c | 287 errno_t sss_mc_refresh_user(const char *username) argument 289 return sss_mc_refresh_ent(username, SSS_TOOLS_USER);
|
| H A D | tools_util.c | 187 DEBUG(SSSDBG_FUNC_DATA, "Parsed username: %s\n", tctx->octx->name); 350 const char *username, 357 spool_file = talloc_asprintf(mem_ctx, "%s/%s", maildir, username); 397 const char *username, 402 ret = remove_mail_spool(mem_ctx, maildir, username, uid, force); 430 const char *username, 438 spool_file = talloc_asprintf(mem_ctx, "%s/%s", maildir, username); 348 remove_mail_spool(TALLOC_CTX *mem_ctx, const char *maildir, const char *username, uid_t uid, bool force) argument 394 remove_homedir(TALLOC_CTX *mem_ctx, const char *homedir, const char *maildir, const char *username, uid_t uid, bool force) argument 429 create_mail_spool(TALLOC_CTX *mem_ctx, const char *username, const char *maildir, uid_t uid, gid_t gid) argument
|
| /sssd-io/src/providers/ad/ |
| H A D | ad_pac.c | 372 char *username; local 408 username = talloc_strdup(tmp_ctx, dummy); 409 if (username == NULL) { 423 *_username = talloc_steal(mem_ctx, username); 443 char *username; member in struct:ad_handle_pac_initgr_state 487 &state->username, 518 ret = sdap_ad_save_group_membership_with_idmapping(state->username, 619 ret = sdap_ad_tokengroups_update_members(state->username,
|
| /sssd-io/src/python/ |
| H A D | pysss.c | 142 "Add a user named ``username``.\n\n" 143 ":param username: name of the user\n\n" 167 char *username = NULL; local 169 const char * const kwlist[] = { "username", "uid", "gid", "gecos", 181 &username, 217 tctx->octx->name = username; 304 "Remove the user named ``username``.\n\n" 305 ":param username: Name of user being removed\n" 316 char *username = NULL; local 321 const char * const kwlist[] = { "username", "remov 433 char *username = NULL; local 760 char *username = NULL; local [all...] |
| /sssd-io/src/responder/secrets/ |
| H A D | proxy.c | 43 char *username; member in struct:pat_basic_auth 109 ret = proxy_get_config_string(pctx, cfg, true, secreq, "username", 110 &cfg->auth.basic.username); 112 "username: %s\n", cfg->auth.basic.username); 124 "auth_header_name: %s\n", cfg->auth.basic.username); 444 ret = tcurl_req_http_basic_auth(tcurl_req, pcfg->auth.basic.username,
|
| /sssd-io/src/responder/sudo/ |
| H A D | sudosrv_get_sudorules.c | 173 const char *username, 182 filter = sysdb_sudo_filter_expired(NULL, username, groups, uid); 198 const char *username, 228 filter = sysdb_sudo_filter_user(tmp_ctx, username, groupnames, orig_uid); 270 const char *username, 291 filter = sysdb_sudo_filter_netgroups(NULL, username, groupnames, uid); 307 const char *username, 329 cli_uid, orig_uid, username, groups, 336 orig_uid, username, groups, 419 const char *username, 170 sudosrv_expired_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 194 sudosrv_cached_rules_by_user(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t cli_uid, uid_t orig_uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 267 sudosrv_cached_rules_by_ng(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 303 sudosrv_cached_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t cli_uid, uid_t orig_uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 414 sudosrv_fetch_rules(TALLOC_CTX *mem_ctx, enum sss_sudo_type type, struct sss_domain_info *domain, uid_t cli_uid, uid_t orig_uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 478 const char *username; member in struct:sudosrv_refresh_rules_state 484 sudosrv_refresh_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_domain_info *domain, int threshold, uid_t uid, const char *username, char **groups) argument 626 const char *username; member in struct:sudosrv_get_rules_state 642 sudosrv_get_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sudo_ctx *sudo_ctx, enum sss_sudo_type type, uid_t cli_uid, const char *username) argument [all...] |