/sssd/src/util/ |
H A D | sss_nss.c | 37 char *username = NULL; local 75 if (homedir_ctx->username == NULL) { 81 username = sss_output_name(tmp_ctx, homedir_ctx->username, 83 if (username == NULL) { 87 result = talloc_asprintf_append(result, "%s%s", p, username); 88 talloc_free(username); 114 || homedir_ctx->username == NULL) { 120 username = sss_output_name(tmp_ctx, homedir_ctx->username, [all...] |
H A D | sss_nss.h | 30 const char *username; member in struct:sss_nss_homedir_ctx
|
H A D | sss_selinux.h | 44 const char *username,
|
/sssd/src/providers/ipa/ |
H A D | ipa_selinux.h | 33 #define selogin_path(mem_ctx, username) \ 34 talloc_asprintf(mem_ctx, "%s/logins/%s", selinux_policy_root(), username)
|
H A D | selinux_child.c | 38 const char *username; member in struct:input_buffer 79 /* username */ 81 DEBUG(SSSDBG_TRACE_INTERNAL, "username length: %d\n", len); 83 DEBUG(SSSDBG_CRIT_FAILURE, "No username set!\n"); 87 ibuf->username = talloc_strndup(ibuf, (char *)(buf + p), len); 88 if (ibuf->username == NULL) return ENOMEM; 89 DEBUG(SSSDBG_TRACE_INTERNAL, "username: %s\n", ibuf->username); 175 ret = get_seuser(ibuf, ibuf->username, &db_seuser, &db_mls_range); 325 ret = sc_set_seuser(ibuf->username, ibu [all...] |
/sssd/src/tests/ |
H A D | python-test.py | 70 def validate_user(self, username, **kwargs): 71 return self._validate_object(self.get_user_info(username), "user", **kwargs) 80 def validate_no_user(self, username): 81 return self._validate_no_object(self.get_user_info(username), "user") 128 def add_user(self, username): 129 self._run_and_check("sss_useradd %s" % (username)) 131 def add_user_not_home(self, username): 132 self._run_and_check("sss_useradd -M %s" % (username)) 134 def remove_user(self, username): 135 self._run_and_check("sss_userdel %s" % (username)) [all...] |
/sssd/src/providers/ldap/ |
H A D | sdap_async_ad.h | 27 errno_t sdap_ad_save_group_membership_with_idmapping(const char *username, 44 sdap_ad_tokengroups_update_members(const char *username,
|
H A D | ldap_auth.h | 35 const char *username,
|
H A D | sdap_access.c | 60 const char *username, 65 const char *username, 75 const char *username, 85 const char *username, 811 const char *username; member in struct:sdap_access_filter_req_ctx 837 const char *username, 859 state->username = username; 867 "Performing access filter check for user [%s]\n", username); 880 ret = sdap_get_basedn_user_entry(user_entry, state->username, 831 sdap_access_filter_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, struct sdap_access_ctx *access_ctx, struct sdap_id_conn_ctx *conn, const char *username, struct ldb_message *user_entry) argument 1207 sdap_save_user_cache_bool(struct sss_domain_info *domain, const char *username, const char *attr_name, bool value) argument 1308 const char *username; member in struct:sdap_access_ppolicy_req_ctx 1327 sdap_access_ppolicy_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, struct sdap_access_ctx *access_ctx, struct sdap_id_conn_ctx *conn, const char *username, struct ldb_message *user_entry, enum sdap_pwpolicy_mode pwpol_mode) argument 1716 is_account_locked(const char *pwdAccountLockedTime, const char *pwdAccountLockedDurationTime, enum sdap_pwpolicy_mode pwpol_mode, const char *username, bool *_locked) argument 1938 sdap_get_basedn_user_entry(struct ldb_message *user_entry, const char *username, const char **_basedn) argument [all...] |
/sssd/src/sss_client/sudo/ |
H A D | sss_sudo.h | 94 * @param[in] username The username to retreive the rules for 116 const char *username, 127 * @param[in] username The username to retreive the rules for. 151 const char *username,
|
H A D | sss_sudo.c | 34 const char *username, 46 const char *username, 61 ret = sss_sudo_create_query(uid, username, &query_buf, &query_len); 91 const char *username, 98 if (username == NULL || strlen(username) == 0) { 104 ret = sss_sudo_send_recv_generic(SSS_SUDO_GET_SUDORULES, uid, username, 110 const char *username, 115 if (username == NULL || strlen(username) 44 sss_sudo_send_recv_generic(enum sss_cli_command command, uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument 90 sss_sudo_send_recv(uid_t uid, const char *username, const char *domainname, uint32_t *_error, struct sss_sudo_result **_result) argument 109 sss_sudo_send_recv_defaults(uid_t uid, const char *username, uint32_t *_error, char **_domainname, struct sss_sudo_result **_result) argument 123 sss_sudo_create_query(uid_t uid, const char *username, uint8_t **_query, size_t *_query_len) argument [all...] |
/sssd/src/providers/simple/ |
H A D | simple_access.h | 42 const char *username);
|
H A D | simple_access_check.c | 49 simple_check_users(struct simple_ctx *ctx, const char *username, argument 68 if (sss_string_equal(domain->case_sensitive, username, 72 username); 76 * are denied. But there's no need to check username 105 if (sss_string_equal(domain->case_sensitive, username, 414 const char *username) 436 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username); 438 /* get domain from username */ 439 state->domain = find_domain_by_object_name(ctx->domain, username); 441 DEBUG(SSSDBG_CRIT_FAILURE, "Invalid user %s!\n", username); 411 simple_check_get_groups_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument 699 const char *username; member in struct:simple_access_check_state 706 simple_access_check_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct simple_ctx *ctx, const char *username) argument [all...] |
/sssd/src/sss_client/sudo_testcli/ |
H A D | sudo_testcli.c | 44 const char *username = NULL; local 50 fprintf(stderr, "Usage: sss_sudo_cli username [uid]\n"); 54 username = argv[1]; 58 passwd = getpwnam(username); 70 ret = sss_sudo_send_recv_defaults(uid, username, &error, 79 username, (unsigned long long)uid, 93 ret = sss_sudo_send_recv(uid, username, domainname, &error, &result);
|
/sssd/src/db/ |
H A D | sysdb_sudo.h | 80 #define SYSDB_SUDO_FILTER_USERNAME 0x01 /* username */ 101 const char *username, 110 const char *username, 116 const char *username, 123 const char *username, uid_t *_uid,
|
/sssd/src/responder/sudo/ |
H A D | sudosrv_get_sudorules.c | 173 const char *username, 182 filter = sysdb_sudo_filter_expired(NULL, username, groups, uid); 197 const char *username, 227 filter = sysdb_sudo_filter_user(tmp_ctx, username, groupnames, uid); 269 const char *username, 290 filter = sysdb_sudo_filter_netgroups(NULL, username, groupnames, uid); 305 const char *username, 326 ret = sudosrv_cached_rules_by_user(tmp_ctx, domain, uid, username, groups, 332 ret = sudosrv_cached_rules_by_ng(tmp_ctx, domain, uid, username, groups, 414 const char *username, 170 sudosrv_expired_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 194 sudosrv_cached_rules_by_user(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 266 sudosrv_cached_rules_by_ng(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groupnames, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 302 sudosrv_cached_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 410 sudosrv_fetch_rules(TALLOC_CTX *mem_ctx, enum sss_sudo_type type, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 472 const char *username; member in struct:sudosrv_refresh_rules_state 478 sudosrv_refresh_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups) argument 608 char *username; member in struct:sudosrv_get_rules_state 620 sudosrv_get_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sudo_ctx *sudo_ctx, enum sss_sudo_type type, uid_t uid, const char *username) argument [all...] |
H A D | sudosrv_private.h | 74 const char *username);
|
/sssd/src/sss_client/libwbclient/ |
H A D | wbc_pam_sssd.c | 26 /* Authenticate a username/password pair */ 27 wbcErr wbcAuthenticateUser(const char *username, argument 33 params.account_name = username; 104 wbcErr wbcLogoffUser(const char *username, argument 129 wbcErr wbcChangeUserPassword(const char *username, argument 136 params.account_name = username;
|
/sssd/src/tools/ |
H A D | tools_util.h | 90 const char *username, 97 const char *username, 109 errno_t sss_mc_refresh_user(const char *username);
|
/sssd/src/providers/data_provider/ |
H A D | dp_target_id.c | 90 const char *username; member in struct:dp_initgr_ctx 101 const char *username; local 110 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL); 111 if (username == NULL) { 116 ctx->username = talloc_strdup(ctx, username); 117 if (ctx->username == NULL) { 182 DBUS_TYPE_STRING, &ctx->username,
|
/sssd/src/responder/pam/ |
H A D | pam_LOCAL_domain.c | 225 const char *username = NULL; local 274 username = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL); 275 if (strcmp(username, pd->user) != 0) { 277 "Expected username [%s] get [%s].\n", pd->user, username); 304 "user: [%s], password hash: [%s]\n", username, pwdhash); 311 "user: [%s], new hash: [%s]\n", username, new_hash);
|
H A D | pamsrv.h | 100 const char *username,
|
/sssd/src/providers/ad/ |
H A D | ad_pac.h | 63 char **username,
|
/sssd/src/providers/krb5/ |
H A D | krb5_wait_queue.c | 177 static void check_wait_queue(struct krb5_ctx *krb5_ctx, char *username) argument 192 key.str = username; 207 "Wait queue for user [%s] is empty.\n", username); 227 username); 233 "No wait queue for user [%s] found.\n", username);
|
/sssd/src/tests/cmocka/ |
H A D | test_krb5_wait_queue.c | 163 const char *username, 169 test_ctx->pd->user = discard_const(username); 171 will_return(krb5_auth_send, username); 179 const char *username) 181 return test_krb5_wait_mock(test_ctx, username, 200, 0, 0, 0); 162 test_krb5_wait_mock(struct test_krb5_wait_queue *test_ctx, const char *username, time_t us_delay, int ret, int pam_status, int dp_err) argument 178 test_krb5_wait_mock_success(struct test_krb5_wait_queue *test_ctx, const char *username) argument
|