/sssd/src/providers/data_provider/ |
H A D | dp.c | 43 provider->uid, provider->gid, true, 73 gid_t gid) 86 provider->gid = gid; 70 dp_init(struct tevent_context *ev, struct be_ctx *be_ctx, uid_t uid, gid_t gid) argument
|
H A D | dp_private.h | 78 gid_t gid; member in struct:data_provider
|
/sssd/src/responder/common/ |
H A D | negcache_files.c | 96 bool is_group_local_by_gid(uid_t gid) argument 104 ret = getgrgid_r(gid, &grp, buffer, BUFFER_SIZE, &grp_result); 107 "Group with GID %"SPRIgid" is a local group\n", gid);
|
/sssd/src/tests/cwrap/ |
H A D | test_usertools.c | 34 gid_t gid; local 37 ret = sss_user_by_name_or_uid("123", &uid, &gid); 40 assert_int_equal(gid, 456); 46 gid_t gid; local 49 ret = sss_user_by_name_or_uid("sssd", &uid, &gid); 52 assert_int_equal(gid, 456); 58 gid_t gid; local 65 ret = sss_user_by_name_or_uid("sssd", NULL, &gid); 67 assert_int_equal(gid, 456);
|
/sssd/src/util/ |
H A D | become_user.c | 28 errno_t become_user(uid_t uid, gid_t gid) argument 34 "Trying to become user [%"SPRIuid"][%"SPRIgid"].\n", uid, gid); 52 /* change gid so that root cannot be regained (changes saved gid too) */ 53 ret = setresgid(gid, gid, gid); 76 gid_t gid; member in struct:sss_creds 86 uid_t uid, gid_t gid, 96 DEBUG(SSSDBG_FUNC_DATA, "Switch user to [%d][%d].\n", uid, gid); 85 switch_creds(TALLOC_CTX *mem_ctx, uid_t uid, gid_t gid, int num_gids, gid_t *gids, struct sss_creds **saved_creds) argument [all...] |
H A D | check_and_open.c | 33 uid_t uid, gid_t gid, 37 uid_t uid, uid_t gid, mode_t mode, mode_t mask, 61 return perform_checks(stat_buf, uid, gid, mode, mask); 64 errno_t check_fd(int fd, uid_t uid, gid_t gid, argument 86 return perform_checks(stat_buf, uid, gid, mode, mask); 90 uid_t uid, gid_t gid, 119 if (gid != (gid_t)(-1) && stat_buf->st_gid != gid) { 120 DEBUG(SSSDBG_TRACE_LIBS, "File must be owned by gid [%d].\n", gid); 36 check_file(const char *filename, uid_t uid, uid_t gid, mode_t mode, mode_t mask, struct stat *caller_stat_buf, bool follow_symlink) argument 89 perform_checks(struct stat *stat_buf, uid_t uid, gid_t gid, mode_t mode, mode_t mask) argument 127 check_and_open_readonly(const char *filename, int *fd, uid_t uid, gid_t gid, mode_t mode, mode_t mask) argument [all...] |
/sssd/src/sss_client/libwbclient/ |
H A D | wbc_idmap_common.c | 40 /* Convert a Windows SID to a Unix gid if there already is a mapping */ 48 /* Convert a Unix gid to a Windows SID if there already is a mapping */ 49 wbcErr wbcQueryGidToSid(gid_t gid, argument 62 wbcErr wbcSetGidMapping(gid_t gid, const struct wbcDomainSid *sid) argument 74 wbcErr wbcRemoveGidMapping(gid_t gid, const struct wbcDomainSid *sid) argument
|
H A D | wbc_idmap_sssd.c | 85 /** @brief Convert a Windows SID to a Unix gid, allocating a gid if needed 122 /* Convert a Unix gid to a Windows SID, allocating a SID if needed */ 123 wbcErr wbcGidToSid(gid_t gid, struct wbcDomainSid *sid) argument 130 ret = sss_nss_getsidbyid(gid, &str_sid, &type); 156 /* Obtain a new gid from Winbind */ 192 ids[c].id.gid = (gid_t) id; 218 wbc_status = wbcGidToSid(ids[c].id.gid, &sids[c]);
|
/sssd/src/responder/common/cache_req/plugins/ |
H A D | cache_req_group_by_id.c | 133 gid_t gid) 137 data = cache_req_data_id(mem_ctx, CACHE_REQ_GROUP_BY_ID, gid); 127 cache_req_group_by_id_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_nc_ctx *ncache, int cache_refresh_percent, const char *domain, gid_t gid) argument
|
/sssd/src/responder/secrets/ |
H A D | secsrv.c | 186 gid_t gid; local 191 SSSD_SERVER_OPTS(uid, gid) 218 ret = server_setup("sssd[secrets]", 0, uid, gid, CONFDB_SEC_CONF_ENTRY,
|
/sssd/src/responder/ssh/ |
H A D | sshsrv.c | 183 gid_t gid; local 188 SSSD_SERVER_OPTS(uid, gid) 215 ret = server_setup("sssd[ssh]", 0, uid, gid,
|
/sssd/src/responder/sudo/ |
H A D | sudosrv.c | 173 gid_t gid; local 178 SSSD_SERVER_OPTS(uid, gid) 205 ret = server_setup("sssd[sudo]", 0, uid, gid, CONFDB_SUDO_CONF_ENTRY,
|
/sssd/src/sss_client/ |
H A D | nss_mc_group.c | 68 result->gr_gid = data->gid; 185 errno_t sss_nss_mc_getgrgid(gid_t gid, argument 202 len = snprintf(gidstr, 11, "%ld", (long)gid); 233 if (gid == data->gid) {
|
/sssd/src/tests/ |
H A D | check_and_open-tests.c | 39 gid_t gid; variable 58 gid = getgid(); 83 uid, gid, S_IFREG|mode, 0); 108 ret = check_file(newpath, uid, gid, S_IFREG|mode, 0, NULL, false); 135 ret = check_file(newpath, uid, gid, S_IFREG|mode, 0, NULL, true); 148 ret = check_and_open_readonly("/dev/null", &fd, uid, gid, S_IFREG|mode, 0); 159 ret = check_and_open_readonly(filename, &fd, uid+1, gid, S_IFREG|mode, 0); 170 ret = check_and_open_readonly(filename, &fd, uid, gid+1, S_IFREG|mode, 0); 172 "check_and_open_readonly succeeded with wrong gid"); 182 uid, gid, S_IFRE [all...] |
H A D | files-tests.c | 45 static gid_t gid; variable 57 gid = getgid(); 243 ret = copy_tree(dir_path, dst_path, 0700, uid, gid); 251 ret = check_and_open_readonly(tmp, &fd, uid, gid, S_IFREG|S_IRWXU, 0); 287 ret = copy_file_secure(foo_path, bar_path, 0700, uid, gid, 0); 294 ret = check_and_open_readonly(bar_path, &fd, uid, gid, S_IFREG|S_IRWXU, 0); 329 ret = copy_tree(dir_path, dst_path, 0700, uid, gid); 368 ret = copy_tree(dir_path, dst_path, 0700, uid, gid);
|
/sssd/src/tools/ |
H A D | sss_sync_ops.h | 42 gid_t gid; member in struct:ops_ctx
|
/sssd/src/providers/krb5/ |
H A D | krb5_auth.h | 42 #define CHILD_OPT_FAST_CCACHE_GID "fast-ccache-gid" 59 gid_t gid; member in struct:krb5child_req
|
/sssd/src/responder/autofs/ |
H A D | autofssrv.c | 191 gid_t gid; local 196 SSSD_SERVER_OPTS(uid, gid) 223 ret = server_setup("sssd[autofs]", 0, uid, gid,
|
/sssd/src/responder/ifp/ |
H A D | ifpsrv.c | 361 gid_t gid; local 366 SSSD_SERVER_OPTS(uid, gid)
|
/sssd/src/responder/pac/ |
H A D | pacsrv.c | 215 gid_t gid; local 220 SSSD_SERVER_OPTS(uid, gid) 247 ret = server_setup("sssd[pac]", 0, uid, gid,
|
/sssd/src/responder/pam/ |
H A D | pamsrv.c | 328 gid_t gid; local 335 SSSD_SERVER_OPTS(uid, gid) 381 ret = server_setup("sssd[pam]", 0, uid, gid, CONFDB_PAM_CONF_ENTRY, &main_ctx);
|
/sssd/src/sbus/ |
H A D | sssd_dbus_server.c | 185 uid_t uid, gid_t gid, 274 if (stat_buf.st_uid != uid || stat_buf.st_gid != gid) { 275 ret = chown(filename, uid, gid); 182 sbus_new_server(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *address, uid_t uid, gid_t gid, bool use_symlink, struct sbus_connection **_server, sbus_server_conn_init_fn init_fn, void *init_pvt_data) argument
|
/sssd/src/tests/cmocka/ |
H A D | common_mock_sysdb_objects.c | 168 gid_t gid, 177 SYSDB_GIDNUM, gid); 166 mock_sysdb_group_rfc2307bis(TALLOC_CTX *mem_ctx, const char *base_dn, gid_t gid, const char *name, const char **members) argument
|
/sssd/src/providers/ |
H A D | backend.h | 85 gid_t gid; member in struct:be_ctx
|
H A D | data_provider_be.c | 370 gid_t gid, 388 be_ctx->gid = gid; 448 ret = dp_init(be_ctx->ev, be_ctx, be_ctx->uid, be_ctx->gid); 496 gid_t gid; local 501 SSSD_SERVER_OPTS(uid, gid) 561 be_domain, uid, gid, 569 ret = chown_debug_file(NULL, uid, gid); 575 ret = become_user(uid, gid); 578 "Cannot become user [%"SPRIuid"][%"SPRIgid"].\n", uid, gid); 367 be_process_init(TALLOC_CTX *mem_ctx, const char *be_domain, uid_t uid, gid_t gid, struct tevent_context *ev, struct confdb_ctx *cdb) argument [all...] |