/sssd/src/tests/intg/ |
H A D | sssd_id.py | 35 def call_sssd_initgroups(user, gid): 38 for given user. It will gather groups only provided by sssd. 41 @param string user name of user 45 gids should contain user group IDs if err is NssReturnCode.SUCCESS 64 res = func(c_char_p(user), c_uint32(gid), start, size, p_groups, limit, 83 def get_user_gids(user): 86 for given user. It will gather groups only provided by sssd. 89 @param string user name of user [all...] |
H A D | ldap_ent.py | 21 def user(base_dn, uid, uidNumber, gidNumber, function 29 Generate an RFC2307(bis) user add-modlist for passing to ldap.add* 33 user = ( 53 user[1].append(('gecos', [gecos])) 54 return user 118 """Add an RFC2307(bis) user add-modlist.""" 119 self.append(user(base_dn or self.base_dn,
|
H A D | sssd_ldb.py | 30 user = 1 variable in class:TsCacheEntry 65 if entry_type == TsCacheEntry.user:
|
H A D | test_memory_cache.py | 375 def assert_user_gids_equal(user, expected_gids): 376 (res, errno, gids) = sssd_id.get_user_gids(user) 378 "Could not find groups for user %s, %d" % (user, errno) 413 def assert_initgroups_equal(user, primary_gid, expected_gids): 414 (res, errno, gids) = sssd_id.call_sssd_initgroups(user, primary_gid) 416 "Could not find groups for user %s, %d" % (user, errno) 433 user = user1_case1 434 (res, errno, _) = sssd_id.call_sssd_initgroups(user, primary_gi [all...] |
/sssd/src/sss_client/ |
H A D | pam_test_client.c | 54 char *user; local 59 fprintf(stderr, "missing action and user name, using default\n"); 61 user = strdup("dummy"); 63 fprintf(stdout, "using first argument as action and default user name\n"); 65 user = strdup("dummy"); 68 user = strdup(argv[2]); 71 if (action == NULL || user == NULL) { 76 fprintf(stdout, "action: %s\nuser: %s\n", action,user); 78 ret = pam_start("sss_test", user, &conv, &pamh);
|
H A D | nss_compat.h | 45 const char *user; member in struct:__netgrent::__anon31::__anon32
|
/sssd/src/providers/krb5/ |
H A D | krb5_utils.h | 37 struct sss_domain_info *dom, const char *user, 42 const char *user,
|
H A D | krb5_access.c | 99 ret = sysdb_get_user_attr(state, be_ctx->domain, state->pd->user, attrs, 103 "sysdb search for upn of user [%s] failed.\n", pd->user); 110 "No attributes for user [%s] found.\n", pd->user); 116 state->kr->user, pd->domain, &state->kr->upn); 126 "UID for user [%s] not known.\n", pd->user); 135 "GID for user [%s] not known.\n", pd->user); [all...] |
H A D | krb5_delayed_online_authentication.c | 132 "Successfully authenticated user [%s].\n", 133 auth_data->pd->user); 135 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to authenticate user [%s].\n", 136 auth_data->pd->user); 177 "trying online authentication.\n", pd->user); 197 "discarding online authentication.\n", pd->user); 222 "but user table does not exists.\n"); 258 "Invalid authtok for user [%s].\n", pd->user); 282 new_pd->key_serial = add_key("user", new_p [all...] |
H A D | krb5_utils.c | 36 struct sss_domain_info *dom, const char *user, 42 if (krb5_ctx == NULL || dom == NULL || user == NULL || _upn == NULL) { 60 ret = krb5_get_simple_upn(mem_ctx, krb5_ctx, dom, user, 81 const char *user, 94 if (sysdb == NULL || user == NULL || upn == NULL) { 104 ret = sysdb_get_user_attr(tmp_ctx, domain, user, attrs, &res); 111 DEBUG(SSSDBG_OP_FAILURE, "[%d] user objects for name [%s] found, " \ 112 "expected 1.\n", res->count, user); 139 "for user [%s].\n", 142 upn, user); 34 find_or_guess_upn(TALLOC_CTX *mem_ctx, struct ldb_message *msg, struct krb5_ctx *krb5_ctx, struct sss_domain_info *dom, const char *user, const char *user_dom, char **_upn) argument 79 check_if_cached_upn_needs_update(struct sysdb_ctx *sysdb, struct sss_domain_info *domain, const char *user, const char *upn) argument [all...] |
H A D | krb5_auth.c | 59 DEBUG(SSSDBG_CRIT_FAILURE, "Missing user or ccache name.\n"); 68 DEBUG(SSSDBG_TRACE_ALL, "%s ccname [%s] for user [%s].\n", 206 pd->user, dom->case_sensitive, &mapped_name); 209 kr->user = mapped_name; 211 kr->kuserok_user = sss_output_name(kr, kr->user, 218 DEBUG(SSSDBG_TRACE_ALL, "No mapping for: %s\n", pd->user); 219 kr->user = pd->user; 221 kr->kuserok_user = sss_output_name(kr, kr->user, 269 ret = sysdb_cache_auth(domain, pd->user, [all...] |
H A D | krb5_wait_queue.c | 4 Kerberos 5 Backend Module - Serialize the request of a user 122 key.str = pd->user; 207 "Wait queue for user [%s] is empty.\n", username); 226 "Failed to remove wait queue for user [%s].\n", 233 "No wait queue for user [%s] found.\n", username); 275 "of user [%s].\n", req, pd->user); 279 DEBUG(SSSDBG_TRACE_LIBS, "Wait queue of user [%s] is empty, " 280 "running request [%p] immediately.\n", pd->user, req); 283 "Failed to add request to wait queue of user [ [all...] |
/sssd/src/providers/ad/ |
H A D | ad_gpo.h | 40 * While a GPO can target both user and computer objects, this 60 const char *user,
|
/sssd/src/util/ |
H A D | sss_selinux.h | 48 struct sysdb_attrs *user,
|
/sssd/src/responder/common/cache_req/plugins/ |
H A D | cache_req_initgroups_by_name.c | 120 struct ldb_result *user; local 144 cr->data->name.lookup, &user); 145 if (ret != EOK || user == NULL || user->count != 1) { 146 /* Case where the user is not found has been already handled. If 149 "Unable to match initgroups user [%d]: %s\n", 154 name = ldb_msg_find_attr_as_string(user->msgs[0], SYSDB_NAME, NULL); 155 talloc_free(user);
|
/sssd/src/responder/pam/ |
H A D | pam_LOCAL_domain.c | 91 lreq->preq->pd->user, 132 lreq->preq->pd->user, 201 lreq->preq->pd->user, 252 ret = sysdb_get_user_attr(lreq, preq->domain, preq->pd->user, attrs, 262 "No user found with filter ["SYSDB_PWNAM_FILTER"]\n", 263 pd->user, pd->user, pd->user); 269 pd->user, pd->user, p [all...] |
/sssd/src/responder/ifp/ |
H A D | org.freedesktop.sssd.infopipe.conf | 11 <policy user="root"> 43 <policy user="root">
|
/sssd/src/tools/ |
H A D | sss_override.c | 96 struct override_user *user) 99 {"name", 'n', POPT_ARG_STRING, &user->name, 0, _("Override name"), NULL }, 100 {"uid", 'u', POPT_ARG_INT, &user->uid, 0, _("Override uid (non-zero value)"), NULL }, 101 {"gid", 'g', POPT_ARG_INT, &user->gid, 0, _("Override gid (non-zero value)"), NULL }, 102 {"home", 'h', POPT_ARG_STRING, &user->home, 0, _("Override home directory"), NULL }, 103 {"shell", 's', POPT_ARG_STRING, &user->shell, 0, _("Override shell"), NULL }, 104 {"gecos", 'c', POPT_ARG_STRING, &user->gecos, 0, _("Override gecos"), NULL }, 105 {"certificate", 'x', POPT_ARG_STRING, &user->cert, 0, _("Override certificate"), NULL }, 109 return parse_cmdline(cmdline, tool_ctx, options, &user->input_name, 110 &user 94 parse_cmdline_user_add(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_user *user) argument 113 parse_cmdline_user_del(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_user *user) argument 121 parse_cmdline_user_show(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_user *user) argument 384 build_user_attrs(TALLOC_CTX *mem_ctx, struct override_user *user) argument 573 get_user_domain_msg(struct sss_tool_ctx *tool_ctx, struct override_user *user) argument 778 struct override_user user; local 1415 struct override_user user = {NULL}; local 1441 struct override_user user = {NULL}; local [all...] |
/sssd/src/responder/nss/ |
H A D | nsssrv.h | 86 const char *user,
|
/sssd/src/examples/ |
H A D | sssd-example.conf | 46 ; ldap_user_object_class = user
|
/sssd/src/tests/ |
H A D | krb5_child-test.c | 158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, argument 170 pd->user = talloc_strdup(pd, user); 171 if (!pd->user) goto fail; 188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, argument 201 pwd = getpwnam(user); 204 "Cannot get info on user [%s]\n", user); 214 kr->pd = create_dummy_pam_data(kr, user, password); 216 ret = krb5_get_simple_upn(kr, kr->krb5_ctx, NULL, kr->pd->user, NUL [all...] |
H A D | pyhbac-test.py | 341 self.assertIsInstance(req.user, pyhbac.HbacRequestElement) 346 self.assertEqual(req.user.name, "") 347 self.assertIsInstance(req.user.groups, list) 348 self.assertCountEqual(req.user.groups, []) 353 req.user = user_el 354 self.assertCountEqual(req.user.name, name) 355 self.assertCountEqual(req.user.groups, groups) 359 req.user.name = name 360 req.user.groups = groups 361 self.assertCountEqual(req.user [all...] |
/sssd/src/providers/ |
H A D | dp_pam_data_util.c | 96 pd->user = talloc_strdup(pd, src->user); 97 if (pd->user == NULL && src->user != NULL) { 169 DEBUG(l, "user: %s\n", PAM_SAFE_ITEM(pd->user));
|
/sssd/src/providers/ipa/ |
H A D | ipa_selinux.c | 59 struct sysdb_attrs *user, 78 struct sysdb_attrs *user, 107 DEBUG(SSSDBG_OP_FAILURE, "Failed to store user map %d. " 145 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, 156 struct sysdb_attrs *user, 194 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) { 228 ret = ipa_selinux_process_seealso_maps(user, host, 245 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, argument 283 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) { 302 "attributes to SELinux user ma 155 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument 840 struct sysdb_attrs *user; member in struct:ipa_get_selinux_state 854 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument 1333 struct sysdb_attrs *user = NULL; local 1445 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument 1509 struct sysdb_attrs *user; member in struct:ipa_selinux_handler_state [all...] |
/sssd/src/lib/ipa_hbac/ |
H A D | ipa_hbac.h | 33 * a particular user login attempt. 135 * - Users: user groups (POSIX or non-POSIX) 193 * - Users: user groups (POSIX or non-POSIX) 213 /** This is a list of user DNs to check, 214 * it must consist of the actual user 216 * containing that user. 218 struct hbac_request_element *user; member in struct:hbac_eval_req 279 * @param[in] hbac_req A user authorization request
|