/sssd/src/providers/krb5/ |
H A D | krb5_init.c | 38 const char *realm; local 45 realm = dp_opt_get_string(ctx->opts, KRB5_REALM); 46 if (realm == NULL) { 69 primary_servers, backup_servers, realm, 85 const char *realm; local 89 realm = dp_opt_get_string(ctx->opts, KRB5_REALM); 90 if (realm == NULL) { 101 primary_servers, backup_servers, realm,
|
H A D | krb5_auth.c | 434 const char *realm; local 571 realm = dp_opt_get_cstring(krb5_ctx->opts, KRB5_REALM); 572 if (realm == NULL) { 573 DEBUG(SSSDBG_CRIT_FAILURE, "Missing Kerberos realm.\n"); 594 ret = compare_principal_realm(kr->upn, realm,
|
H A D | krb5_ccache.c | 474 const char *realm, const char *principal) 507 tgt_name = talloc_asprintf(tmp_ctx, "krbtgt/%s@%s", realm, realm); 473 sss_krb5_cc_verify_ccache(const char *ccname, uid_t uid, gid_t gid, const char *realm, const char *principal) argument
|
H A D | krb5_common.h | 71 char *realm; member in struct:krb5_service 134 char *realm; member in struct:krb5_ctx 143 char *realm; member in struct:remove_info_files_ctx 159 errno_t write_krb5info_file(const char *realm, const char *kdc, 166 const char *realm, 185 errno_t remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm); 191 errno_t compare_principal_realm(const char *upn, const char *realm,
|
H A D | krb5_common.c | 169 const char *realm; local 183 realm = dp_opt_get_cstring(opts, KRB5_REALM); 184 if (realm == NULL) { 190 realm = dom->name; 193 krb5_ctx->realm = talloc_strdup(krb5_ctx, realm); 194 if (krb5_ctx->realm == NULL) { 196 "Failed to set realm, krb5_child might not work as expected.\n"); 391 errno_t write_krb5info_file(const char *realm, const char *server, argument 403 if (realm 721 krb5_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx, const char *service_name, const char *primary_servers, const char *backup_servers, const char *realm, bool use_kdcinfo, struct krb5_service **_service) argument 801 remove_krb5_info_files(TALLOC_CTX *mem_ctx, const char *realm) argument 888 char *realm = (char *)private_data; local 993 const char *realm = NULL; local 1051 compare_principal_realm(const char *upn, const char *realm, bool *different_realm) argument [all...] |
/sssd/src/providers/ipa/ |
H A D | ipa_subdomains.h | 101 const char *realm; member in struct:ipa_server_mode_ctx
|
H A D | ipa_auth.c | 232 char *realm; local 253 realm = dp_opt_get_string(state->auth_ctx->ipa_options, IPA_KRB5_REALM); 256 realm);
|
H A D | ipa_common.c | 49 char *realm; local 97 /* First check whether the realm has been manually specified */ 98 realm = dp_opt_get_string(opts->basic, IPA_KRB5_REALM); 99 if (!realm) { 101 realm = get_uppercase_realm(opts, domain); 102 if (!realm) { 108 realm); 178 char *realm; local 240 /* set krb realm */ 242 realm 930 char *realm; local [all...] |
H A D | ipa_id.c | 215 const char *realm; member in struct:ipa_initgr_get_overrides_state 254 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic, 256 if (state->realm == NULL) { 257 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n"); 338 state->realm, 482 const char *realm; member in struct:ipa_id_get_account_info_state 541 state->realm = dp_opt_get_string(state->ipa_ctx->ipa_options->basic, 543 if (state->realm == NULL) { 544 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n"); 601 state->ipa_ctx->ipa_options, state->realm, [all...] |
H A D | ipa_subdomains_server.c | 172 forest_realm = subdom->forest_root->realm; 177 id_ctx->server_mode->realm, 266 /* Set KRB5 realm to same as the one of IPA when IPA 269 id_ctx->server_mode->realm, 623 state->forest_realm = subdom->forest_root->realm; 625 DB_PATH, subdom->parent->realm); 1053 char *realm; local 1079 realm = dp_opt_get_string(id_ctx->ipa_options->basic, IPA_KRB5_REALM); 1080 if (realm == NULL) { 1081 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm fo [all...] |
H A D | ipa_subdomains.c | 385 char *realm; local 406 realm = get_uppercase_realm(tmp_ctx, name); 407 if (!realm) { 457 ret = sysdb_subdomain_store(parent->sysdb, name, realm, flat, 849 && domain->realm != NULL) { 887 const char *realm = NULL; local 929 realm = dp_opt_get_string(state->ipa_options->basic, IPA_KRB5_REALM); 930 if (realm == NULL) { 931 DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n"); 936 ret = sysdb_master_domain_add_info(state->domain, realm, fla [all...] |
/sssd/src/providers/ldap/ |
H A D | sdap_utils.c | 236 const char *realm; local 243 realm = dp_opt_get_cstring(sdap_basic_opts, SDAP_KRB5_REALM); 244 if (realm == NULL) { 256 p + 1, realm);
|
H A D | sdap_dyndns.c | 50 const char *realm; member in struct:sdap_dyndns_update_state 91 const char *realm, 108 state->realm = realm; 323 const char *realm; local 329 realm = NULL; 332 realm = state->realm; 335 ret = be_nsupdate_create_fwd_msg(state, realm, servername, 464 const char *realm; local 83 sdap_dyndns_update_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct dp_option *opts, struct sdap_id_ctx *sdap_ctx, enum be_nsupdate_auth auth_type, const char *ifname, const char *hostname, const char *realm, const int ttl, bool check_diff) argument [all...] |
H A D | ldap_common.c | 159 char *realm = (char *) private_data; local 162 ret = remove_krb5_info_files(se, realm); 172 const char *realm) 179 sig_realm = talloc_strdup(mem_ctx, realm); 221 ret = remove_krb5_info_files(tmp_ctx, ctx->realm); 232 const char *realm, 245 ctx->realm = talloc_strdup(ctx, realm); 247 if (ctx->realm == NULL || ctx->kdc_service_name == NULL) { 288 /* Configuration of SASL auth ID and realm */ 170 sdap_install_sigterm_handler(TALLOC_CTX *mem_ctx, struct tevent_context *ev, const char *realm) argument 230 sdap_install_offline_callback(TALLOC_CTX *mem_ctx, struct be_ctx *be_ctx, const char *realm, const char *service_name) argument 361 const char *realm = NULL; local 393 const char *realm; local [all...] |
H A D | sdap_async_connection.c | 1056 const char *realm; member in struct:sdap_kinit_state 1081 const char *realm, 1092 principal, realm, lifetime); 1104 state->realm = realm; 1174 tgtreq = sdap_get_tgt_send(state, state->ev, state->realm, 1073 sdap_kinit_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct be_ctx *be, struct sdap_handle *sh, const char *krb_service_name, int timeout, const char *keytab, const char *principal, const char *realm, bool canonicalize, int lifetime) argument
|
/sssd/src/krb5_plugin/ |
H A D | sssd_krb5_locator_plugin.c | 83 static int get_krb5info(const char *realm, struct sssd_ctx *ctx, argument 109 len = strlen(realm) + strlen(name_tmpl); 117 ret = snprintf(krb5info_name, len, name_tmpl, realm); 259 const char *realm, 276 if (ctx->sssd_realm == NULL || strcmp(ctx->sssd_realm, realm) != 0) { 278 ctx->sssd_realm = strdup(realm); 284 ret = get_krb5info(realm, ctx, locate_service_kdc); 292 ret = get_krb5info(realm, ctx, locate_service_kpasswd); 303 PLUGIN_DEBUG(("sssd_realm[%s] requested realm[%s] family[%d] socktype[%d] " 304 "locate_service[%d]\n", ctx->sssd_realm, realm, famil 257 sssd_krb5_locator_lookup(void *private_data, enum locate_service_type svc, const char *realm, int socktype, int family, int (*cbfunc)(void *, int, struct sockaddr *), void *cbdata) argument [all...] |
/sssd/src/tests/ |
H A D | krb5_child-test.c | 97 create_dummy_krb5_ctx(TALLOC_CTX *mem_ctx, const char *realm) argument 147 ret = dp_opt_set_string(krb5_ctx->opts, KRB5_REALM, realm); 189 const char *password, const char *realm, 212 kr->krb5_ctx = create_dummy_krb5_ctx(kr, realm); 416 { "realm", 'r', POPT_ARG_STRING, &pc_realm, 0, 417 "The Kerberos realm to use", NULL }, 461 DEBUG(SSSDBG_FATAL_FAILURE, "Please specify the realm\n"); 188 create_dummy_req(TALLOC_CTX *mem_ctx, const char *user, const char *password, const char *realm, const char *ccname, const char *ccname_template, int timeout) argument
|
/sssd/src/db/ |
H A D | sysdb_subdomains.c | 29 const char *realm, 79 if (realm != NULL) { 80 dom->realm = talloc_strdup(dom, realm); 81 if (dom->realm == NULL) { 82 DEBUG(SSSDBG_OP_FAILURE, "Failed to copy realm name.\n"); 171 if (d->realm && (strcasecmp(d->forest, d->realm) == 0)) { 182 && root->realm != NULL 183 && strcasecmp(member->forest, root->realm) 26 new_subdomain(TALLOC_CTX *mem_ctx, struct sss_domain_info *parent, const char *name, const char *realm, const char *flat_name, const char *id, bool mpg, bool enumerate, const char *forest, uint32_t trust_direction) argument 245 const char *realm; local 664 sysdb_master_domain_add_info(struct sss_domain_info *domain, const char *realm, const char *flat, const char *id, const char *forest, struct ldb_message_element *upn_suffixes) argument 822 sysdb_subdomain_store(struct sysdb_ctx *sysdb, const char *name, const char *realm, const char *flat_name, const char *domain_id, bool mpg, bool enumerate, const char *forest, uint32_t trust_direction, struct ldb_message_element *upn_suffixes) argument [all...] |
/sssd/src/providers/ad/ |
H A D | ad_common.c | 140 const char *realm, 147 ret = dp_opt_set_string(ad_options->basic, AD_KRB5_REALM, realm); 149 DEBUG(SSSDBG_OP_FAILURE, "Cannot set AD krb5 realm\n"); 178 const char *realm, 189 ret = set_common_ad_trust_opts(ad_options, realm, ad_domain, hostname, 213 const char *realm; local 219 realm = get_uppercase_realm(ad_options, ad_domain); 220 if (!realm) { 225 ret = set_common_ad_trust_opts(ad_options, realm, 353 char *realm; local 139 set_common_ad_trust_opts(struct ad_options *ad_options, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument 177 ad_create_2way_trust_options(TALLOC_CTX *mem_ctx, const char *realm, const char *ad_domain, const char *hostname, const char *keytab) argument [all...] |
H A D | ad_id.c | 503 const char *realm; member in struct:ad_enumeration_state 543 state->realm = dp_opt_get_cstring(state->id_ctx->ad_options->basic, 545 if (state->realm == NULL) { 546 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm\n"); 633 ret = sysdb_master_domain_add_info(state->sdom->dom, state->realm,
|
H A D | ad_subdomains.c | 158 const char *realm; local 162 realm = dp_opt_get_cstring(id_ctx->ad_options->basic, AD_KRB5_REALM); 166 if (realm == NULL || hostname == NULL || ad_domain == NULL) { 167 DEBUG(SSSDBG_CONF_SETTINGS, "Missing realm or hostname.\n"); 171 ad_options = ad_create_2way_trust_options(id_ctx, realm, ad_domain, 193 ret = ad_failover_init(ad_options, be_ctx, NULL, NULL, realm, 287 char *realm; local 315 realm = get_uppercase_realm(tmp_ctx, name); 316 if (!realm) { 345 ret = sysdb_subdomain_store(domain->sysdb, name, realm, fla 1232 const char *realm; local [all...] |
/sssd/src/util/ |
H A D | usertools.c | 41 /* Function returns given realm name as new uppercase string */ 44 char *realm; local 47 realm = talloc_strdup(memctx, name); 48 if (!realm) { 52 c = realm; 58 return realm;
|
H A D | sss_krb5.c | 75 char *realm = NULL; local 149 realm = talloc_asprintf(tmp_ctx, realm_patterns[i], desired_realm); 150 if (realm == NULL) { 155 realm = NULL; 158 kerr = find_principal_in_keytab(krb_ctx, keytab, primary, realm, 161 talloc_zfree(realm); 233 DEBUG(SSSDBG_FUNC_DATA, "Selected realm: %s\n", *_realm); 270 * @param pattern_realm realm part of the principal we want to perform 691 /* omit realm if local realm */ 771 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument 785 sss_krb5_princ_realm(krb5_context context, krb5_const_principal princ, const char **realm, int *len) argument 1077 sss_krb5_realm_has_proxy(const char *realm) argument [all...] |
/sssd/src/providers/ |
H A D | be_dyndns.c | 401 nsupdate_msg_add_realm_cmd(TALLOC_CTX *mem_ctx, const char *realm) argument 404 if (realm != NULL) { 405 return talloc_asprintf(mem_ctx, "realm %s\n", realm); 412 nsupdate_msg_create_common(TALLOC_CTX *mem_ctx, const char *realm, argument 422 realm_directive = nsupdate_msg_add_realm_cmd(tmp_ctx, realm); 432 "Creating update message for server [%s] and realm [%s].\n", 433 servername, realm); 435 /* Add the server, realm and headers */ 440 "Creating update message for realm [ 459 be_nsupdate_create_fwd_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, uint8_t remove_af, struct sss_iface_addr *addresses, char **_update_msg) argument 504 be_nsupdate_create_ptr_msg(TALLOC_CTX *mem_ctx, const char *realm, const char *servername, const char *hostname, const unsigned int ttl, struct sockaddr_storage *address, bool delete, char **_update_msg) argument [all...] |
/sssd/src/confdb/ |
H A D | confdb.h | 302 char *realm; member in struct:sss_domain_info
|