Searched refs:user (Results 1 - 25 of 77) sorted by relevance

1234

/sssd/src/tests/intg/
H A Dsssd_id.py35 def call_sssd_initgroups(user, gid):
38 for given user. It will gather groups only provided by sssd.
41 @param string user name of user
45 gids should contain user group IDs if err is NssReturnCode.SUCCESS
64 res = func(c_char_p(user), c_uint32(gid), start, size, p_groups, limit,
83 def get_user_gids(user):
86 for given user. It will gather groups only provided by sssd.
89 @param string user name of user
[all...]
H A Dldap_ent.py21 def user(base_dn, uid, uidNumber, gidNumber, function
29 Generate an RFC2307(bis) user add-modlist for passing to ldap.add*
33 user = (
53 user[1].append(('gecos', [gecos]))
54 return user
118 """Add an RFC2307(bis) user add-modlist."""
119 self.append(user(base_dn or self.base_dn,
H A Dsssd_ldb.py30 user = 1 variable in class:TsCacheEntry
65 if entry_type == TsCacheEntry.user:
H A Dtest_memory_cache.py375 def assert_user_gids_equal(user, expected_gids):
376 (res, errno, gids) = sssd_id.get_user_gids(user)
378 "Could not find groups for user %s, %d" % (user, errno)
413 def assert_initgroups_equal(user, primary_gid, expected_gids):
414 (res, errno, gids) = sssd_id.call_sssd_initgroups(user, primary_gid)
416 "Could not find groups for user %s, %d" % (user, errno)
433 user = user1_case1
434 (res, errno, _) = sssd_id.call_sssd_initgroups(user, primary_gi
[all...]
/sssd/src/sss_client/
H A Dpam_test_client.c54 char *user; local
59 fprintf(stderr, "missing action and user name, using default\n");
61 user = strdup("dummy");
63 fprintf(stdout, "using first argument as action and default user name\n");
65 user = strdup("dummy");
68 user = strdup(argv[2]);
71 if (action == NULL || user == NULL) {
76 fprintf(stdout, "action: %s\nuser: %s\n", action,user);
78 ret = pam_start("sss_test", user, &conv, &pamh);
H A Dnss_compat.h45 const char *user; member in struct:__netgrent::__anon31::__anon32
/sssd/src/providers/krb5/
H A Dkrb5_utils.h37 struct sss_domain_info *dom, const char *user,
42 const char *user,
H A Dkrb5_access.c99 ret = sysdb_get_user_attr(state, be_ctx->domain, state->pd->user, attrs,
103 "sysdb search for upn of user [%s] failed.\n", pd->user);
110 "No attributes for user [%s] found.\n", pd->user);
116 state->kr->user, pd->domain, &state->kr->upn);
126 "UID for user [%s] not known.\n", pd->user);
135 "GID for user [%s] not known.\n", pd->user);
[all...]
H A Dkrb5_delayed_online_authentication.c132 "Successfully authenticated user [%s].\n",
133 auth_data->pd->user);
135 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to authenticate user [%s].\n",
136 auth_data->pd->user);
177 "trying online authentication.\n", pd->user);
197 "discarding online authentication.\n", pd->user);
222 "but user table does not exists.\n");
258 "Invalid authtok for user [%s].\n", pd->user);
282 new_pd->key_serial = add_key("user", new_p
[all...]
H A Dkrb5_utils.c36 struct sss_domain_info *dom, const char *user,
42 if (krb5_ctx == NULL || dom == NULL || user == NULL || _upn == NULL) {
60 ret = krb5_get_simple_upn(mem_ctx, krb5_ctx, dom, user,
81 const char *user,
94 if (sysdb == NULL || user == NULL || upn == NULL) {
104 ret = sysdb_get_user_attr(tmp_ctx, domain, user, attrs, &res);
111 DEBUG(SSSDBG_OP_FAILURE, "[%d] user objects for name [%s] found, " \
112 "expected 1.\n", res->count, user);
139 "for user [%s].\n",
142 upn, user);
34 find_or_guess_upn(TALLOC_CTX *mem_ctx, struct ldb_message *msg, struct krb5_ctx *krb5_ctx, struct sss_domain_info *dom, const char *user, const char *user_dom, char **_upn) argument
79 check_if_cached_upn_needs_update(struct sysdb_ctx *sysdb, struct sss_domain_info *domain, const char *user, const char *upn) argument
[all...]
H A Dkrb5_auth.c59 DEBUG(SSSDBG_CRIT_FAILURE, "Missing user or ccache name.\n");
68 DEBUG(SSSDBG_TRACE_ALL, "%s ccname [%s] for user [%s].\n",
206 pd->user, dom->case_sensitive, &mapped_name);
209 kr->user = mapped_name;
211 kr->kuserok_user = sss_output_name(kr, kr->user,
218 DEBUG(SSSDBG_TRACE_ALL, "No mapping for: %s\n", pd->user);
219 kr->user = pd->user;
221 kr->kuserok_user = sss_output_name(kr, kr->user,
269 ret = sysdb_cache_auth(domain, pd->user,
[all...]
H A Dkrb5_wait_queue.c4 Kerberos 5 Backend Module - Serialize the request of a user
122 key.str = pd->user;
207 "Wait queue for user [%s] is empty.\n", username);
226 "Failed to remove wait queue for user [%s].\n",
233 "No wait queue for user [%s] found.\n", username);
275 "of user [%s].\n", req, pd->user);
279 DEBUG(SSSDBG_TRACE_LIBS, "Wait queue of user [%s] is empty, "
280 "running request [%p] immediately.\n", pd->user, req);
283 "Failed to add request to wait queue of user [
[all...]
/sssd/src/providers/ad/
H A Dad_gpo.h40 * While a GPO can target both user and computer objects, this
60 const char *user,
/sssd/src/util/
H A Dsss_selinux.h48 struct sysdb_attrs *user,
/sssd/src/responder/common/cache_req/plugins/
H A Dcache_req_initgroups_by_name.c120 struct ldb_result *user; local
144 cr->data->name.lookup, &user);
145 if (ret != EOK || user == NULL || user->count != 1) {
146 /* Case where the user is not found has been already handled. If
149 "Unable to match initgroups user [%d]: %s\n",
154 name = ldb_msg_find_attr_as_string(user->msgs[0], SYSDB_NAME, NULL);
155 talloc_free(user);
/sssd/src/responder/pam/
H A Dpam_LOCAL_domain.c91 lreq->preq->pd->user,
132 lreq->preq->pd->user,
201 lreq->preq->pd->user,
252 ret = sysdb_get_user_attr(lreq, preq->domain, preq->pd->user, attrs,
262 "No user found with filter ["SYSDB_PWNAM_FILTER"]\n",
263 pd->user, pd->user, pd->user);
269 pd->user, pd->user, p
[all...]
/sssd/src/responder/ifp/
H A Dorg.freedesktop.sssd.infopipe.conf11 <policy user="root">
43 <policy user="root">
/sssd/src/tools/
H A Dsss_override.c96 struct override_user *user)
99 {"name", 'n', POPT_ARG_STRING, &user->name, 0, _("Override name"), NULL },
100 {"uid", 'u', POPT_ARG_INT, &user->uid, 0, _("Override uid (non-zero value)"), NULL },
101 {"gid", 'g', POPT_ARG_INT, &user->gid, 0, _("Override gid (non-zero value)"), NULL },
102 {"home", 'h', POPT_ARG_STRING, &user->home, 0, _("Override home directory"), NULL },
103 {"shell", 's', POPT_ARG_STRING, &user->shell, 0, _("Override shell"), NULL },
104 {"gecos", 'c', POPT_ARG_STRING, &user->gecos, 0, _("Override gecos"), NULL },
105 {"certificate", 'x', POPT_ARG_STRING, &user->cert, 0, _("Override certificate"), NULL },
109 return parse_cmdline(cmdline, tool_ctx, options, &user->input_name,
110 &user
94 parse_cmdline_user_add(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_user *user) argument
113 parse_cmdline_user_del(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_user *user) argument
121 parse_cmdline_user_show(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_user *user) argument
384 build_user_attrs(TALLOC_CTX *mem_ctx, struct override_user *user) argument
573 get_user_domain_msg(struct sss_tool_ctx *tool_ctx, struct override_user *user) argument
778 struct override_user user; local
1415 struct override_user user = {NULL}; local
1441 struct override_user user = {NULL}; local
[all...]
/sssd/src/responder/nss/
H A Dnsssrv.h86 const char *user,
/sssd/src/examples/
H A Dsssd-example.conf46 ; ldap_user_object_class = user
/sssd/src/tests/
H A Dkrb5_child-test.c158 create_dummy_pam_data(TALLOC_CTX *mem_ctx, const char *user, argument
170 pd->user = talloc_strdup(pd, user);
171 if (!pd->user) goto fail;
188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, argument
201 pwd = getpwnam(user);
204 "Cannot get info on user [%s]\n", user);
214 kr->pd = create_dummy_pam_data(kr, user, password);
216 ret = krb5_get_simple_upn(kr, kr->krb5_ctx, NULL, kr->pd->user, NUL
[all...]
H A Dpyhbac-test.py341 self.assertIsInstance(req.user, pyhbac.HbacRequestElement)
346 self.assertEqual(req.user.name, "")
347 self.assertIsInstance(req.user.groups, list)
348 self.assertCountEqual(req.user.groups, [])
353 req.user = user_el
354 self.assertCountEqual(req.user.name, name)
355 self.assertCountEqual(req.user.groups, groups)
359 req.user.name = name
360 req.user.groups = groups
361 self.assertCountEqual(req.user
[all...]
/sssd/src/providers/
H A Ddp_pam_data_util.c96 pd->user = talloc_strdup(pd, src->user);
97 if (pd->user == NULL && src->user != NULL) {
169 DEBUG(l, "user: %s\n", PAM_SAFE_ITEM(pd->user));
/sssd/src/providers/ipa/
H A Dipa_selinux.c59 struct sysdb_attrs *user,
78 struct sysdb_attrs *user,
107 DEBUG(SSSDBG_OP_FAILURE, "Failed to store user map %d. "
145 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user,
156 struct sysdb_attrs *user,
194 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) {
228 ret = ipa_selinux_process_seealso_maps(user, host,
245 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, argument
283 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) {
302 "attributes to SELinux user ma
155 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument
840 struct sysdb_attrs *user; member in struct:ipa_get_selinux_state
854 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument
1333 struct sysdb_attrs *user = NULL; local
1445 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument
1509 struct sysdb_attrs *user; member in struct:ipa_selinux_handler_state
[all...]
/sssd/src/lib/ipa_hbac/
H A Dipa_hbac.h33 * a particular user login attempt.
135 * - Users: user groups (POSIX or non-POSIX)
193 * - Users: user groups (POSIX or non-POSIX)
213 /** This is a list of user DNs to check,
214 * it must consist of the actual user
216 * containing that user.
218 struct hbac_request_element *user; member in struct:hbac_eval_req
279 * @param[in] hbac_req A user authorization request

Completed in 316 milliseconds

1234