Searched defs:username (Results 1 - 25 of 47) sorted by relevance

12

/sssd-io/src/util/
H A Dsss_nss.h30 const char *username; member in struct:sss_nss_homedir_ctx
H A Dsss_nss.c37 char *username = NULL; local
75 if (homedir_ctx->username == NULL) {
81 username = sss_output_name(tmp_ctx, homedir_ctx->username,
83 if (username == NULL) {
87 result = talloc_asprintf_append(result, "%s%s", p, username);
88 talloc_free(username);
92 if (homedir_ctx->username == NULL) {
98 username = sss_output_name(tmp_ctx, homedir_ctx->username,
[all...]
H A Dsss_selinux.c192 const char *username,
218 ret = sysdb_search_user_by_name(tmp_ctx, domain, username, attrs,
190 sss_selinux_extract_user(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *username, struct sysdb_attrs **_user_attrs) argument
/sssd-io/src/sss_client/sudo_testcli/
H A Dsudo_testcli.c44 const char *username = NULL; local
50 fprintf(stderr, "Usage: sss_sudo_cli username [uid]\n");
54 username = argv[1];
58 passwd = getpwnam(username);
70 ret = sss_sudo_send_recv_defaults(uid, username, &error,
79 username, (unsigned long long)uid,
93 ret = sss_sudo_send_recv(uid, username, domainname, &error, &result);
/sssd-io/src/responder/pam/
H A Dpam_LOCAL_domain.c225 const char *username = NULL; local
274 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL);
275 if (strcmp(username, pd->user) != 0) {
277 "Expected username [%s] get [%s].\n", pd->user, username);
304 "user: [%s], password hash: [%s]\n", username, pwdhash);
311 "user: [%s], new hash: [%s]\n", username, new_hash);
/sssd-io/src/responder/ssh/
H A Dssh_cmd.c40 ssh_check_non_sssd_user(const char *username) argument
44 pwd = getpwnam(username);
46 DEBUG(SSSDBG_TRACE_ALL, "%s is a non-SSSD user\n", username);
/sssd-io/src/sss_client/libwbclient/
H A Dwbc_pam_sssd.c26 /* Authenticate a username/password pair */
27 wbcErr wbcAuthenticateUser(const char *username, argument
33 params.account_name = username;
104 wbcErr wbcLogoffUser(const char *username, argument
129 wbcErr wbcChangeUserPassword(const char *username, argument
136 params.account_name = username;
/sssd-io/src/providers/ipa/
H A Dipa_deskprofile_rules.c61 const char *username)
161 /* Add the username to the filter */
162 ret = sss_parse_internal_fqname(state, username, &user, NULL);
177 /* Add all parent groups of `username` to the filter */
178 ret = get_sysdb_grouplist(state, domain->sysdb, domain, username,
54 ipa_deskprofile_rule_info_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_handle *sh, struct sdap_options *opts, struct sdap_search_base **search_bases, struct sysdb_attrs *ipa_host, struct sss_domain_info *domain, const char *username) argument
H A Dselinux_child.c38 const char *username; member in struct:input_buffer
79 /* username */
81 DEBUG(SSSDBG_TRACE_INTERNAL, "username length: %d\n", len);
83 DEBUG(SSSDBG_CRIT_FAILURE, "No username set!\n");
87 ibuf->username = talloc_strndup(ibuf, (char *)(buf + p), len);
88 if (ibuf->username == NULL) return ENOMEM;
89 DEBUG(SSSDBG_TRACE_INTERNAL, "username: %s\n", ibuf->username);
175 ret = sss_get_seuser(ibuf->username, &db_seuser, &db_mls_range);
334 ret = sc_set_seuser(ibuf->username, ibu
[all...]
H A Dipa_hbac_common.c270 const char *username,
373 const char *username,
396 ret = sss_parse_internal_fqname(tmp_ctx, username, &shortname, NULL);
423 ret = sysdb_initgroups(tmp_ctx, domain, username, &res);
433 "User [%s] not found in cache.\n", username);
443 "[%u] groups for [%s]\n", res->count - 1, username);
371 hbac_eval_user_element(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *username, struct hbac_request_element **user_element) argument
H A Dipa_session.c55 const char *username; member in struct:ipa_fetch_deskprofile_state
79 const char *username)
103 state->username = username;
339 state->username);
457 const char *username,
468 const char *username, /* fully-qualified */
621 const char *username,
642 ret = sss_parse_internal_fqname(tmp_ctx, username,
646 username, re
75 ipa_fetch_deskprofile_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct ipa_session_ctx *session_ctx, const char *username) argument
619 ipa_pam_session_handler_get_deskprofile_user_info(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *username, char **_shortname, char **_domain, char **_user_dir, uid_t *_uid, gid_t *_gid) argument
697 ipa_pam_session_handler_save_deskprofile_rules( struct be_ctx *be_ctx, struct sss_domain_info *domain, const char *username, const char *user_dir, const char *hostname, uid_t uid, gid_t gid) argument
[all...]
/sssd-io/src/providers/krb5/
H A Dkrb5_wait_queue.c177 static void check_wait_queue(struct krb5_ctx *krb5_ctx, char *username) argument
192 key.str = username;
207 "Wait queue for user [%s] is empty.\n", username);
227 username);
233 "No wait queue for user [%s] found.\n", username);
/sssd-io/src/providers/data_provider/
H A Ddp_target_id.c79 const char *username; member in struct:dp_initgr_ctx
92 const char *username; local
120 /* Copy original username */
121 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL);
122 if (username == NULL) {
126 ctx->username = talloc_strdup(ctx, username);
127 if (ctx->username == NULL) {
172 if (ctx->username == NULL) {
193 DBUS_TYPE_STRING, &ctx->username,
[all...]
/sssd-io/src/providers/simple/
H A Dsimple_access_check.c49 simple_check_users(struct simple_ctx *ctx, const char *username, argument
59 "Checking against allow list username [%s].\n",
71 if (sss_string_equal(domain->case_sensitive, username,
75 username);
79 * are denied. But there's no need to check username
99 "Checking against deny list username [%s].\n",
111 if (sss_string_equal(domain->case_sensitive, username,
425 const char *username)
447 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username);
449 /* get domain from username */
422 simple_check_get_groups_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument
710 const char *username; member in struct:simple_access_check_state
717 simple_access_check_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument
[all...]
/sssd-io/src/responder/common/
H A Dresponder_utils.c365 const char *username; local
369 username = sss_view_ldb_msg_find_attr_as_string(state->dom,
373 if (username == NULL) {
380 username,
/sssd-io/src/sss_client/sudo/
H A Dsss_sudo.c34 const char *username,
46 const char *username,
61 ret = sss_sudo_create_query(uid, username, &query_buf, &query_len);
91 const char *username,
98 if (username == NULL || strlen(username) == 0) {
104 ret = sss_sudo_send_recv_generic(SSS_SUDO_GET_SUDORULES, uid, username,
110 const char *username,
115 if (username == NULL || strlen(username)
44 sss_sudo_send_recv_generic(enum sss_cli_command command, uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument
90 sss_sudo_send_recv(uid_t uid, const char *username, const char *domainname, uint32_t *_error, struct sss_sudo_result **_result) argument
109 sss_sudo_send_recv_defaults(uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument
123 sss_sudo_create_query(uid_t uid, const char *username, uint8_t **_query, size_t *_query_len) argument
[all...]
/sssd-io/src/tests/cmocka/
H A Dtest_krb5_wait_queue.c163 const char *username,
169 test_ctx->pd->user = discard_const(username);
171 will_return(krb5_auth_send, username);
179 const char *username)
181 return test_krb5_wait_mock(test_ctx, username, 200, 0, 0, 0);
162 test_krb5_wait_mock(struct test_krb5_wait_queue *test_ctx, const char *username, time_t us_delay, int ret, int pam_status, int dp_err) argument
178 test_krb5_wait_mock_success(struct test_krb5_wait_queue *test_ctx, const char *username) argument
H A Dtest_simple_access.c181 const char *username,
189 simple_test_ctx->pd->user = discard_const(username);
180 run_simple_access_check(struct simple_test_ctx *simple_test_ctx, const char *username, int expected_rv, bool allow_access) argument
/sssd-io/src/tests/
H A Dtcurl_test_tool.c53 const char *username; member in struct:tool_options
215 if (opts->username != NULL && opts->password != NULL) {
216 ret = tcurl_req_http_basic_auth(requests[i], opts->username,
334 { "username", '\0', POPT_ARG_STRING, &opts.username, '\0', "Username for basic authentication", NULL },
/sssd-io/src/tools/
H A Dtools_mc_util.c287 errno_t sss_mc_refresh_user(const char *username) argument
289 return sss_mc_refresh_ent(username, SSS_TOOLS_USER);
H A Dtools_util.c187 DEBUG(SSSDBG_FUNC_DATA, "Parsed username: %s\n", tctx->octx->name);
350 const char *username,
357 spool_file = talloc_asprintf(mem_ctx, "%s/%s", maildir, username);
397 const char *username,
402 ret = remove_mail_spool(mem_ctx, maildir, username, uid, force);
430 const char *username,
438 spool_file = talloc_asprintf(mem_ctx, "%s/%s", maildir, username);
348 remove_mail_spool(TALLOC_CTX *mem_ctx, const char *maildir, const char *username, uid_t uid, bool force) argument
394 remove_homedir(TALLOC_CTX *mem_ctx, const char *homedir, const char *maildir, const char *username, uid_t uid, bool force) argument
429 create_mail_spool(TALLOC_CTX *mem_ctx, const char *username, const char *maildir, uid_t uid, gid_t gid) argument
/sssd-io/src/providers/ad/
H A Dad_pac.c372 char *username; local
408 username = talloc_strdup(tmp_ctx, dummy);
409 if (username == NULL) {
423 *_username = talloc_steal(mem_ctx, username);
443 char *username; member in struct:ad_handle_pac_initgr_state
487 &state->username,
518 ret = sdap_ad_save_group_membership_with_idmapping(state->username,
619 ret = sdap_ad_tokengroups_update_members(state->username,
/sssd-io/src/python/
H A Dpysss.c142 "Add a user named ``username``.\n\n"
143 ":param username: name of the user\n\n"
167 char *username = NULL; local
169 const char * const kwlist[] = { "username", "uid", "gid", "gecos",
181 &username,
217 tctx->octx->name = username;
304 "Remove the user named ``username``.\n\n"
305 ":param username: Name of user being removed\n"
316 char *username = NULL; local
321 const char * const kwlist[] = { "username", "remov
433 char *username = NULL; local
760 char *username = NULL; local
[all...]
/sssd-io/src/responder/secrets/
H A Dproxy.c43 char *username; member in struct:pat_basic_auth
109 ret = proxy_get_config_string(pctx, cfg, true, secreq, "username",
110 &cfg->auth.basic.username);
112 "username: %s\n", cfg->auth.basic.username);
124 "auth_header_name: %s\n", cfg->auth.basic.username);
444 ret = tcurl_req_http_basic_auth(tcurl_req, pcfg->auth.basic.username,
/sssd-io/src/responder/sudo/
H A Dsudosrv_get_sudorules.c173 const char *username,
182 filter = sysdb_sudo_filter_expired(NULL, username, groups, uid);
198 const char *username,
228 filter = sysdb_sudo_filter_user(tmp_ctx, username, groupnames, orig_uid);
270 const char *username,
291 filter = sysdb_sudo_filter_netgroups(NULL, username, groupnames, uid);
307 const char *username,
329 cli_uid, orig_uid, username, groups,
336 orig_uid, username, groups,
419 const char *username,
170 sudosrv_expired_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
194 sudosrv_cached_rules_by_user(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t cli_uid, uid_t orig_uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
267 sudosrv_cached_rules_by_ng(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
303 sudosrv_cached_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t cli_uid, uid_t orig_uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
414 sudosrv_fetch_rules(TALLOC_CTX *mem_ctx, enum sss_sudo_type type, struct sss_domain_info *domain, uid_t cli_uid, uid_t orig_uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
478 const char *username; member in struct:sudosrv_refresh_rules_state
484 sudosrv_refresh_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_domain_info *domain, int threshold, uid_t uid, const char *username, char **groups) argument
626 const char *username; member in struct:sudosrv_get_rules_state
642 sudosrv_get_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sudo_ctx *sudo_ctx, enum sss_sudo_type type, uid_t cli_uid, const char *username) argument
[all...]

Completed in 52 milliseconds

12