Searched refs:username (Results 1 - 25 of 59) sorted by relevance

123

/sssd/src/util/
H A Dsss_nss.c37 char *username = NULL; local
75 if (homedir_ctx->username == NULL) {
81 username = sss_output_name(tmp_ctx, homedir_ctx->username,
83 if (username == NULL) {
87 result = talloc_asprintf_append(result, "%s%s", p, username);
88 talloc_free(username);
114 || homedir_ctx->username == NULL) {
120 username = sss_output_name(tmp_ctx, homedir_ctx->username,
[all...]
H A Dsss_nss.h30 const char *username; member in struct:sss_nss_homedir_ctx
H A Dsss_selinux.h44 const char *username,
/sssd/src/providers/ipa/
H A Dipa_selinux.h33 #define selogin_path(mem_ctx, username) \
34 talloc_asprintf(mem_ctx, "%s/logins/%s", selinux_policy_root(), username)
H A Dselinux_child.c38 const char *username; member in struct:input_buffer
79 /* username */
81 DEBUG(SSSDBG_TRACE_INTERNAL, "username length: %d\n", len);
83 DEBUG(SSSDBG_CRIT_FAILURE, "No username set!\n");
87 ibuf->username = talloc_strndup(ibuf, (char *)(buf + p), len);
88 if (ibuf->username == NULL) return ENOMEM;
89 DEBUG(SSSDBG_TRACE_INTERNAL, "username: %s\n", ibuf->username);
175 ret = get_seuser(ibuf, ibuf->username, &db_seuser, &db_mls_range);
325 ret = sc_set_seuser(ibuf->username, ibu
[all...]
/sssd/src/tests/
H A Dpython-test.py70 def validate_user(self, username, **kwargs):
71 return self._validate_object(self.get_user_info(username), "user", **kwargs)
80 def validate_no_user(self, username):
81 return self._validate_no_object(self.get_user_info(username), "user")
128 def add_user(self, username):
129 self._run_and_check("sss_useradd %s" % (username))
131 def add_user_not_home(self, username):
132 self._run_and_check("sss_useradd -M %s" % (username))
134 def remove_user(self, username):
135 self._run_and_check("sss_userdel %s" % (username))
[all...]
/sssd/src/providers/ldap/
H A Dsdap_async_ad.h27 errno_t sdap_ad_save_group_membership_with_idmapping(const char *username,
44 sdap_ad_tokengroups_update_members(const char *username,
H A Dldap_auth.h35 const char *username,
H A Dsdap_access.c60 const char *username,
65 const char *username,
75 const char *username,
85 const char *username,
811 const char *username; member in struct:sdap_access_filter_req_ctx
837 const char *username,
859 state->username = username;
867 "Performing access filter check for user [%s]\n", username);
880 ret = sdap_get_basedn_user_entry(user_entry, state->username,
831 sdap_access_filter_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, struct sdap_access_ctx *access_ctx, struct sdap_id_conn_ctx *conn, const char *username, struct ldb_message *user_entry) argument
1207 sdap_save_user_cache_bool(struct sss_domain_info *domain, const char *username, const char *attr_name, bool value) argument
1308 const char *username; member in struct:sdap_access_ppolicy_req_ctx
1327 sdap_access_ppolicy_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, struct sdap_access_ctx *access_ctx, struct sdap_id_conn_ctx *conn, const char *username, struct ldb_message *user_entry, enum sdap_pwpolicy_mode pwpol_mode) argument
1716 is_account_locked(const char *pwdAccountLockedTime, const char *pwdAccountLockedDurationTime, enum sdap_pwpolicy_mode pwpol_mode, const char *username, bool *_locked) argument
1938 sdap_get_basedn_user_entry(struct ldb_message *user_entry, const char *username, const char **_basedn) argument
[all...]
/sssd/src/sss_client/sudo/
H A Dsss_sudo.h94 * @param[in] username The username to retreive the rules for
116 const char *username,
127 * @param[in] username The username to retreive the rules for.
151 const char *username,
H A Dsss_sudo.c34 const char *username,
46 const char *username,
61 ret = sss_sudo_create_query(uid, username, &query_buf, &query_len);
91 const char *username,
98 if (username == NULL || strlen(username) == 0) {
104 ret = sss_sudo_send_recv_generic(SSS_SUDO_GET_SUDORULES, uid, username,
110 const char *username,
115 if (username == NULL || strlen(username)
44 sss_sudo_send_recv_generic(enum sss_cli_command command, uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument
90 sss_sudo_send_recv(uid_t uid, const char *username, const char *domainname, uint32_t *_error, struct sss_sudo_result **_result) argument
109 sss_sudo_send_recv_defaults(uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument
123 sss_sudo_create_query(uid_t uid, const char *username, uint8_t **_query, size_t *_query_len) argument
[all...]
/sssd/src/providers/simple/
H A Dsimple_access.h42 const char *username);
H A Dsimple_access_check.c49 simple_check_users(struct simple_ctx *ctx, const char *username, argument
68 if (sss_string_equal(domain->case_sensitive, username,
72 username);
76 * are denied. But there's no need to check username
105 if (sss_string_equal(domain->case_sensitive, username,
414 const char *username)
436 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username);
438 /* get domain from username */
439 state->domain = find_domain_by_object_name(ctx->domain, username);
441 DEBUG(SSSDBG_CRIT_FAILURE, "Invalid user %s!\n", username);
411 simple_check_get_groups_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument
699 const char *username; member in struct:simple_access_check_state
706 simple_access_check_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument
[all...]
/sssd/src/sss_client/sudo_testcli/
H A Dsudo_testcli.c44 const char *username = NULL; local
50 fprintf(stderr, "Usage: sss_sudo_cli username [uid]\n");
54 username = argv[1];
58 passwd = getpwnam(username);
70 ret = sss_sudo_send_recv_defaults(uid, username, &error,
79 username, (unsigned long long)uid,
93 ret = sss_sudo_send_recv(uid, username, domainname, &error, &result);
/sssd/src/db/
H A Dsysdb_sudo.h80 #define SYSDB_SUDO_FILTER_USERNAME 0x01 /* username */
101 const char *username,
110 const char *username,
116 const char *username,
123 const char *username, uid_t *_uid,
/sssd/src/responder/sudo/
H A Dsudosrv_get_sudorules.c173 const char *username,
182 filter = sysdb_sudo_filter_expired(NULL, username, groups, uid);
197 const char *username,
227 filter = sysdb_sudo_filter_user(tmp_ctx, username, groupnames, uid);
269 const char *username,
290 filter = sysdb_sudo_filter_netgroups(NULL, username, groupnames, uid);
305 const char *username,
326 ret = sudosrv_cached_rules_by_user(tmp_ctx, domain, uid, username, groups,
332 ret = sudosrv_cached_rules_by_ng(tmp_ctx, domain, uid, username, groups,
414 const char *username,
170 sudosrv_expired_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
194 sudosrv_cached_rules_by_user(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
266 sudosrv_cached_rules_by_ng(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
302 sudosrv_cached_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
410 sudosrv_fetch_rules(TALLOC_CTX *mem_ctx, enum sss_sudo_type type, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument
472 const char *username; member in struct:sudosrv_refresh_rules_state
478 sudosrv_refresh_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups) argument
608 char *username; member in struct:sudosrv_get_rules_state
620 sudosrv_get_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sudo_ctx *sudo_ctx, enum sss_sudo_type type, uid_t uid, const char *username) argument
[all...]
H A Dsudosrv_private.h74 const char *username);
/sssd/src/sss_client/libwbclient/
H A Dwbc_pam_sssd.c26 /* Authenticate a username/password pair */
27 wbcErr wbcAuthenticateUser(const char *username, argument
33 params.account_name = username;
104 wbcErr wbcLogoffUser(const char *username, argument
129 wbcErr wbcChangeUserPassword(const char *username, argument
136 params.account_name = username;
/sssd/src/tools/
H A Dtools_util.h90 const char *username,
97 const char *username,
109 errno_t sss_mc_refresh_user(const char *username);
/sssd/src/providers/data_provider/
H A Ddp_target_id.c90 const char *username; member in struct:dp_initgr_ctx
101 const char *username; local
110 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL);
111 if (username == NULL) {
116 ctx->username = talloc_strdup(ctx, username);
117 if (ctx->username == NULL) {
182 DBUS_TYPE_STRING, &ctx->username,
/sssd/src/responder/pam/
H A Dpam_LOCAL_domain.c225 const char *username = NULL; local
274 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL);
275 if (strcmp(username, pd->user) != 0) {
277 "Expected username [%s] get [%s].\n", pd->user, username);
304 "user: [%s], password hash: [%s]\n", username, pwdhash);
311 "user: [%s], new hash: [%s]\n", username, new_hash);
H A Dpamsrv.h100 const char *username,
/sssd/src/providers/ad/
H A Dad_pac.h63 char **username,
/sssd/src/providers/krb5/
H A Dkrb5_wait_queue.c177 static void check_wait_queue(struct krb5_ctx *krb5_ctx, char *username) argument
192 key.str = username;
207 "Wait queue for user [%s] is empty.\n", username);
227 username);
233 "No wait queue for user [%s] found.\n", username);
/sssd/src/tests/cmocka/
H A Dtest_krb5_wait_queue.c163 const char *username,
169 test_ctx->pd->user = discard_const(username);
171 will_return(krb5_auth_send, username);
179 const char *username)
181 return test_krb5_wait_mock(test_ctx, username, 200, 0, 0, 0);
162 test_krb5_wait_mock(struct test_krb5_wait_queue *test_ctx, const char *username, time_t us_delay, int ret, int pam_status, int dp_err) argument
178 test_krb5_wait_mock_success(struct test_krb5_wait_queue *test_ctx, const char *username) argument

Completed in 231 milliseconds

123