Searched defs:host (Results 1 - 20 of 20) sorted by relevance

/sssd-io/src/providers/
H A Dfail_over_srv.h32 char *host; member in struct:fo_server_info
/sssd-io/src/sss_client/
H A Dnss_compat.h44 const char *host; member in struct:__netgrent::__anon41::__anon42
/sssd-io/src/responder/nss/
H A Dnss_protocol_netgr.c30 struct sized_string host; local
37 to_sized_string(&host, entry->value.triple.hostname);
41 if (host.len == 0) {
42 host.len = 1;
43 host.str = "";
57 + host.len + user.len + domain.len);
66 SAFEALIGN_SET_STRING(&body[*_rp], host.str, host.len, _rp);
/sssd-io/src/db/
H A Dsysdb_ssh.c45 "Error storing host %s [%d]: %s\n", name, ret, strerror(ret));
65 struct ldb_message *host = NULL; local
69 DEBUG(SSSDBG_TRACE_FUNC, "Storing host %s\n", name);
84 ret = sysdb_get_ssh_host(tmp_ctx, domain, name, search_attrs, &host);
107 if (host) {
108 el = ldb_msg_find_element(host, SYSDB_NAME_ALIAS);
140 /* make sure sshPublicKey is present when modifying an existing host */
141 if (host) {
234 "Updating known_hosts expire time of host %s\n", name);
273 DEBUG(SSSDBG_TRACE_FUNC, "Deleting host
321 sysdb_get_ssh_host(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *name, const char **attrs, struct ldb_message **host) argument
[all...]
H A Dsysdb_search.c1710 char *host = NULL; local
1749 /* Copy the host string */
1750 host = talloc_strndup(tmp_ctx, p_host, len);
1751 if (!host) {
1813 if (host) {
1814 *hostname = talloc_steal(mem_ctx, host);
/sssd-io/src/sss_client/ssh/
H A Dsss_ssh_knownhostsproxy.c205 _("The port to use to connect to the host"), NULL },
215 const char *host = NULL; local
282 host = ai->ai_canonname;
291 host = canonhost;
295 if (host) {
298 host, pc_domain, pc_host, &ent);
/sssd-io/src/tests/python/sssd/testlib/common/
H A Dqe_class.py3 import pytest_multihost.host namespace
57 class QeBaseHost(pytest_multihost.host.BaseHost):
63 """QeHost subclass of multihost plugin host class.
65 This extends functionality of the host class for SSSD QE purposes.
183 class QeWinHost(QeBaseHost, pytest_multihost.host.WinHost):
186 Subclass of pytest_multihost.host.WinHost, QeBaseHost
/sssd-io/src/tests/
H A Dsysdb_ssh-tests.c165 struct ldb_message *host; member in struct:test_data
197 attrs, &data->host);
239 fail_if(ret != EOK, "Could not store host into database");
273 fail_if(ret != EOK, "Could not delete host from database");
308 fail_if(ret != EOK, "Deletion of nonexistent host returned code %d", ret);
351 fail("Could not store host '%s' to database", TEST_HOSTNAME);
358 fail_if(ret != EOK, "Could not find host '%s'",TEST_HOSTNAME);
H A Dutil-tests.c1009 const char *host; member in struct:__anon58
1024 for (i = 0; data[i].host != NULL; i++) {
1025 ret = is_host_in_domain(data[i].host, data[i].domain);
1027 "Got: %d\n", data[i].host, data[i].domain,
/sssd-io/src/util/
H A Dsss_selinux.c52 struct sysdb_attrs *host,
73 /* Search for user and host related elements */
135 if (host) {
136 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_DN, &dn);
141 ret = sysdb_attrs_get_el(host, SYSDB_ORIG_MEMBEROF, &memberof);
150 * The rule won't match if host category != "all" and user map doesn't
151 * contain neither host nor any of its groups in memberHost attribute
50 sss_selinux_match(struct sysdb_attrs *usermap, struct sysdb_attrs *user, struct sysdb_attrs *host, uint32_t *_priority) argument
H A Dtev_curl.c1041 long host = verify_host ? 2L : 0L; local
1048 ret = tcurl_set_option(tcurl_req, CURLOPT_SSL_VERIFYHOST, host);
H A Dutil.c665 bool is_host_in_domain(const char *host, const char *domain) argument
667 int diff = strlen(host) - strlen(domain);
669 if (diff == 0 && strcmp(host, domain) == 0) {
673 if (diff > 0 && strcmp(host + diff, domain) == 0 && host[diff - 1] == '.') {
/sssd-io/src/providers/ipa/
H A Dipa_hbac_common.c332 /* Get the source host */
337 * source host.
348 /* The target host is always the current machine */
619 struct hbac_request_element *host; local
629 host = talloc_zero(tmp_ctx, struct hbac_request_element);
630 if (host == NULL) {
635 host->name = hostname;
637 if (host->name == NULL) {
638 /* We don't know the host (probably an rhost)
641 ret = create_empty_grouplist(host);
[all...]
H A Dipa_deskprofile_rules_util.c52 * 1 = user, group, host, hostgroup
53 * 2 = user, group, hostgroup, host
54 * 3 = user, host, group, hostgroup
55 * 4 = user, host, hostgroup, group
56 * 5 = user, hostgroup, group, host
57 * 6 = user, hostgroup, host, group
58 * 7 = group, user, host, hostgroup
59 * 8 = group, user, hostgroup, host
60 * 9 = group, host, user, hostgroup
61 * 10 = group, host, hostgrou
532 bool host = false; local
[all...]
H A Dipa_sudo_async.c78 struct ipa_hostinfo *host,
105 for (i = 0; i < host->num_hosts; i++) {
106 filter = ipa_sudo_filter_append_origdn(filter, host->hosts[i],
114 for (i = 0; i < host->num_hostgroups; i++) {
115 filter = ipa_sudo_filter_append_origdn(filter, host->hostgroups[i],
369 struct ipa_hostinfo *host; member in struct:ipa_sudo_fetch_state
401 struct ipa_hostinfo *host,
425 state->host = host;
566 host_filter = ipa_sudo_host_filter(state, state->host, ma
77 ipa_sudo_host_filter(TALLOC_CTX *mem_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map) argument
397 ipa_sudo_fetch_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sss_domain_info *domain, struct ipa_sudo_ctx *sudo_ctx, struct ipa_hostinfo *host, struct sdap_attr_map *map_user, struct sdap_attr_map *map_group, struct sdap_attr_map *map_host, struct sdap_attr_map *map_hostgroup, struct sdap_handle *sh, const char *cmdgroups_filter, const char *search_filter) argument
1002 struct ipa_hostinfo *host; local
[all...]
H A Dipa_selinux.c61 struct sysdb_attrs *host,
80 struct sysdb_attrs *host,
147 struct sysdb_attrs *host,
158 struct sysdb_attrs *host,
195 if (sss_selinux_match(selinux_maps[i], user, host, &priority)) {
229 ret = ipa_selinux_process_seealso_maps(user, host,
247 struct sysdb_attrs *host,
284 if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) {
840 struct sysdb_attrs *host; member in struct:ipa_get_selinux_state
858 struct sysdb_attrs *host,
156 ipa_selinux_process_maps(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **selinux_maps, size_t selinux_map_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, struct sysdb_attrs ***_usermaps) argument
246 ipa_selinux_process_seealso_maps(struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **seealso_rules, size_t seealso_rules_count, struct sysdb_attrs **hbac_rules, size_t hbac_rule_count, uint32_t top_priority, struct sysdb_attrs **usermaps, size_t best_match_maps_cnt) argument
855 ipa_get_selinux_send(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct ipa_selinux_ctx *selinux_ctx) argument
1100 struct sysdb_attrs **host; local
1354 struct sysdb_attrs *host = NULL; local
1465 ipa_selinux_create_child_input(TALLOC_CTX *mem_ctx, struct sysdb_attrs *user, struct sysdb_attrs *host, struct sysdb_attrs **maps, size_t map_count, struct sysdb_attrs **hbac_rules, size_t hbac_count, const char *map_order, struct pam_data *pd, struct sss_domain_info *user_domain, const char *default_user, struct selinux_child_input **_sci) argument
1530 struct sysdb_attrs *host; member in struct:ipa_selinux_handler_state
[all...]
/sssd-io/src/responder/secrets/
H A Dsecsrv_private.h63 char *host; member in struct:sec_url
/sssd-io/src/tests/cmocka/
H A Dtest_sysdb_sudo.c57 const char *host; member in struct:test_rule
99 rules[i].host);
120 rules[0].host);
276 assert_string_equal(result, rules[0].host);
334 assert_string_equal(result, rules[0].host);
412 assert_string_equal(result, rules[0].host);
779 rules[0].host);
/sssd-io/src/providers/ldap/
H A Dsdap_access.c1249 char *host; local
1274 host = (char *)el->values[i].data;
1275 if (host[0] == '!' &&
1276 strcasecmp(hostname, host+1) == 0) {
1277 /* This host is explicitly denied */
1278 DEBUG(SSSDBG_CONF_SETTINGS, "Access denied by [%s]\n", host);
1282 } else if (strcasecmp(hostname, host) == 0) {
1283 /* This host is explicitly allowed */
1284 DEBUG(SSSDBG_CONF_SETTINGS, "Access granted for [%s]\n", host);
1289 } else if (strcmp("*", host)
[all...]
H A Dsdap_async_connection.c265 /* Set host name canonicalization for LDAP SASL bind */
437 char *host; member in struct:sdap_connect_host_state
454 const char *host,
481 state->host = talloc_strdup(state, host);
482 if (state->host == NULL) {
487 state->uri = talloc_asprintf(state, "%s://%s:%d", protocol, host, port);
493 DEBUG(SSSDBG_TRACE_FUNC, "Resolving host %s\n", host);
496 host, family_orde
447 sdap_connect_host_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_options *opts, struct resolv_ctx *resolv_ctx, enum restrict_family family_order, enum host_database *host_db, const char *protocol, const char *host, int port, bool use_start_tls) argument
[all...]

Completed in 44 milliseconds