/sssd-io/src/db/ |
H A D | sysdb_private.h | 140 struct sss_names_ctx *names; /* upgrade to 0.18 needs to parse names */ member in struct:sysdb_dom_upgrade_ctx
|
H A D | sysdb_upgrade.c | 1699 struct sss_names_ctx *names, 1726 ret = sss_parse_name(mod_msg, names, rawname, NULL, &shortname); 1778 struct sss_names_ctx *names, 1798 * because those can contain either names or UUIDs 1821 ret = sss_parse_name(tmp_ctx, names, (const char *) val->data, 1855 struct sss_names_ctx *names, 1889 fqdn = qualify_rdn(tmp_ctx, ldb, names, attr_dn); 1947 struct sss_names_ctx *names, 1977 ret = qualify_attr(object, mod_msg, names, 1991 names, dn_attr 1697 qualify_attr(struct ldb_message *msg, struct ldb_message *mod_msg, struct sss_names_ctx *names, const char *domain_name, const char *attrname, should_qualify_val_fn qfn) argument 1776 qualify_rdn(TALLOC_CTX *mem_ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_dn *old_dn_val) argument 1852 qualify_dn_attr(struct ldb_context *ldb, struct ldb_message *msg, struct ldb_message *mod_msg, struct sss_names_ctx *names, const char *attrname) argument 1945 qualify_object(TALLOC_CTX *mem_ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_message *object, bool qualify_dn, const char *domain_attr, unsigned domain_index, const char *name_attrs[], const char *dn_attrs[], should_qualify_val_fn qfn) argument 2040 qualify_objects(struct upgrade_ctx *ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_dn *base_dn, bool qualify_dn, const char *domain_attr, unsigned domain_index, const char *filter, const char *name_attrs[], const char *dn_attrs[], should_qualify_val_fn qfn) argument 2082 qualify_users(struct upgrade_ctx *ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_dn *base_dn) argument 2108 qualify_groups(struct upgrade_ctx *ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_dn *base_dn) argument 2134 qualify_user_overrides(struct upgrade_ctx *ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_dn *base_dn) argument 2158 qualify_group_overrides(struct upgrade_ctx *ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_dn *base_dn) argument 2178 qualify_sudo_rules(struct upgrade_ctx *ctx, struct ldb_context *ldb, struct sss_names_ctx *names, struct ldb_dn *base_dn) argument 2202 struct sss_names_ctx *names = upgrade_ctx->names; local [all...] |
/sssd-io/src/providers/ldap/ |
H A D | sdap_refresh.c | 34 char **names; member in struct:sdap_refresh_state 46 char **names, 60 if (names == NULL) { 68 state->names = names; 134 if (state->names == NULL) { 139 state->account_req->filter_value = state->names[state->index]; 212 char **names, 216 BE_REQ_USER, names, pvt); 229 char **names, 41 sdap_refresh_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, int entry_type, char **names, void *pvt) argument 208 sdap_refresh_users_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, char **names, void *pvt) argument 225 sdap_refresh_groups_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, char **names, void *pvt) argument 242 sdap_refresh_netgroups_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, char **names, void *pvt) argument [all...] |
/sssd-io/src/lib/ipa_hbac/ |
H A D | ipa_hbac.h | 128 * - Services: PAM service names 130 const char **names; member in struct:hbac_rule_element 186 * - Services: PAM service names
|
/sssd-io/src/python/ |
H A D | pysss_nss_idmap.c | 226 char **names = NULL; local 235 ret = sss_nss_getlistbycert(cert, &names, &id_types); 245 for (c = 0; names[c] != NULL; c++) { 248 PyUnicode_FromString(names[c]), 262 if (names != NULL) { 263 for (c = 0; names[c] != NULL; c++) { 264 free(names[c]); 266 free(names); 390 "getsidbyname(name or list/tuple of names) -> dict(name => dict(results))\n\
|
H A D | pyhbac.c | 295 PyObject *names; member in struct:__anon17 311 self->names = PyList_New(0); 313 if (!self->names || !self->groups || !self->category) { 325 Py_CLEAR(self->names); 342 Py_VISIT(self->names); 348 hbac_rule_element_set_names(HbacRuleElement *self, PyObject *names, 360 const char * const kwlist[] = { "names", "groups", "category", NULL }; 361 PyObject *names = NULL; local 369 &names, &groups, &category)) { 373 if (names) { 405 hbac_rule_element_set_names(HbacRuleElement *self, PyObject *names, void *closure) argument [all...] |
/sssd-io/src/responder/ifp/ |
H A D | ifp_components.c | 59 char **names = NULL; local 63 ret = confdb_list_all_domain_names(NULL, confdb, &names); 68 for (i = 0; names[i] != NULL; i++) { 69 if (strcmp(names[i], name) == 0) { 199 char **names = NULL; local 209 ret = confdb_list_all_domain_names(tmp_ctx, confdb, &names); 214 for (num = 0; names[num] != NULL; num++); 223 list[i] = sbus_opath_compose(list, PATH_BACKENDS, names[i]);
|
/sssd-io/src/sss_client/idmap/ |
H A D | sss_nss_idmap.c | 50 char **names; member in union:output::__anon31 94 char ***names, enum sss_id_type **types) 131 *names = n; 219 char **names; local 327 &names, &types); 333 out->d.names = names; 544 *fq_name = out.d.names; 93 buf_to_name_type_list(uint8_t *buf, size_t buf_len, uint32_t num, char ***names, enum sss_id_type **types) argument
|
/sssd-io/src/sss_client/libwbclient/ |
H A D | wbc_sid_sssd.c | 171 /* Translate a collection of RIDs within a domain to names */ 186 const char **names = NULL; local 198 names = wbcAllocateStringArray(num_rids + 1); 199 if (names == NULL) { 218 names[c] = strdup(name); 220 if (names[c] == NULL) { 233 *pnames = names; 241 wbcFreeMemory(names);
|
H A D | wbc_ctx_sssd.c | 77 struct wbcTranslatedName **names) 87 const char ***names, 74 wbcCtxLookupSids(struct wbcContext *ctx, const struct wbcDomainSid *sids, int num_sids, struct wbcDomainInfo **domains, int *num_domains, struct wbcTranslatedName **names) argument 82 wbcCtxLookupRids(struct wbcContext *ctx, struct wbcDomainSid *dom_sid, int num_rids, uint32_t *rids, const char **domain_name, const char ***names, enum wbcSidType **types) argument
|
/sssd-io/src/tests/ |
H A D | stress-tests.c | 208 char **names = NULL; local 256 ret = generate_names(ctx, pc_prefix, pc_start, pc_stop, &names); 265 ret = read_names(ctx, stdin, &names); 287 for (idx=0; names[idx]; idx++) { 298 ret = run_one_testcase(names[idx], pc_groups, pc_enoent_fail);
|
H A D | sysdb-tests.c | 1481 "%1$s@%2$s", &subdomain->names); 1482 fail_if(ret != EOK, "Failed to init names."); 5980 "Unexpected names found, expected [%s,%s], got [%s,%s].", 6488 char **names; local 6497 ret = confdb_list_all_domain_names(tmp_ctx, confdb, &names); 6499 ck_assert(names != NULL); 6500 ck_assert(names[0] == NULL); 6511 char **names; local 6533 ret = confdb_list_all_domain_names(tmp_ctx, confdb, &names); 6535 ck_assert(names ! 6949 char **names; local [all...] |
/sssd-io/src/confdb/ |
H A D | confdb.c | 1037 /* Determine if user/group names will be Fully Qualified 1574 char **names = NULL; local 1596 names = talloc_zero_array(tmp_ctx, char*, res->count + 1); 1597 if (names == NULL) { 1613 names[i] = talloc_strdup(names, name); 1614 if (names[i] == NULL) { 1620 *_names = talloc_steal(mem_ctx, names); 1640 char **names; local 1671 names [all...] |
H A D | confdb.h | 344 struct sss_names_ctx *names; member in struct:sss_domain_info 429 * Get a null-terminated linked-list of all domain names 434 * @return 0 - Lookup succeeded and all domain names are in the list 646 * @param[out] num_sections Number of section names returned
|
/sssd-io/src/tests/cmocka/ |
H A D | test_sss_sifp.c | 1968 const char *names[] = {"LDAP", "IPA"}; local 1989 reply_variant_basic(msg_ldap, DBUS_TYPE_STRING_AS_STRING, &names[0]); 1990 reply_variant_basic(msg_ipa, DBUS_TYPE_STRING_AS_STRING, &names[1]); 2003 assert_string_equal(out[i], names[i]);
|
H A D | test_nss_srv.c | 1424 TEST_DOM_NAME, &nss_test_ctx->tctx->dom->names); 1625 exp_members[0] = sss_tc_fqname(tmp_ctx, nss_test_ctx->tctx->dom->names, 1628 exp_members[1] = sss_tc_fqname(tmp_ctx, nss_test_ctx->tctx->dom->names, 1633 nss_test_ctx->tctx->dom->names, 1652 * group structure with those members present as fully qualified names 1680 * qualified names 1727 nss_test_ctx->subdom->names, 1733 nss_test_ctx->subdom->names, 1739 nss_test_ctx->subdom->names, 1817 nss_test_ctx->subdom->names, 2326 const char *names[] = { "Cryptographic Operators@BUILTIN", local 2354 const char *names[] = { "Abc@BUILTIN", "BUILTIN\\\\Abc", NULL }; local 2380 const char *names[] = { "CREATOR OWNER@CREATOR AUTHORITY", local [all...] |