/sssd/src/tests/cmocka/ |
H A D | test_sdap_access.c | 42 void test_nds_check_expire(void **state) argument 47 tc = talloc_get_type(*state, struct expire_test_ctx);
|
H A D | test_find_uid.c | 37 void test_check_if_uid_is_active_success(void **state) argument 50 void test_check_if_uid_is_active_fail(void **state) argument 63 void test_get_uid_table(void **state) argument
|
H A D | test_ldap_auth.c | 50 static void test_pwexpire_krb(void **state) argument 56 tc = talloc_get_type(*state, struct expire_test_ctx);
|
H A D | test_sss_ssh.c | 38 void test_textual_public_key(void **state) argument
|
H A D | sss_nss_idmap-tests.c | 86 void test_getsidbyname(void **state) argument 130 void test_getorigbyname(void **state) argument
|
H A D | test_ipa_dn.c | 38 static int ipa_dn_test_setup(void **state) argument 44 *state = test_ctx; 57 static int ipa_dn_test_teardown(void **state) argument 59 talloc_zfree(*state); 63 static void ipa_check_rdn_test(void **state) argument 68 test_ctx = talloc_get_type_abort(*state, struct ipa_dn_test_ctx); 95 static void ipa_check_rdn_bool_test(void **state) argument 100 test_ctx = talloc_get_type_abort(*state, struct ipa_dn_test_ctx); 127 static void ipa_get_rdn_test(void **state) argument 134 test_ctx = talloc_get_type_abort(*state, struc [all...] |
H A D | test_ipa_subdomains_utils.c | 41 static int test_ipa_subdom_setup(void **state) argument 54 *state = test_ctx; 58 static int test_ipa_subdom_teardown(void **state) argument 62 test_ctx = talloc_get_type(*state, struct test_ipa_subdom_ctx); 85 static void test_ipa_subdom_ldb_dn(void **state) argument 91 test_ctx = talloc_get_type(*state, struct test_ipa_subdom_ctx); 105 static void test_ipa_subdom_ldb_dn_fail(void **state) argument 111 test_ctx = talloc_get_type(*state, struct test_ipa_subdom_ctx); 148 static void test_ipa_subdom_is_member_dom(void **state) argument 154 test_ctx = talloc_get_type(*state, struc [all...] |
H A D | test_string_utils.c | 24 void test_replace_whitespaces(void **state) argument 78 void test_reverse_replace_whitespaces(void **state) argument 137 void test_guid_blob_to_string_buf(void **state) argument 196 void test_get_last_x_chars(void **state) argument 224 void test_concatenate_string_array(void **state) argument
|
/sssd/src/providers/data_provider/ |
H A D | dp_builtin.c | 38 struct dp_access_permit_handler_state *state; local 41 req = tevent_req_create(mem_ctx, &state, 48 state->pd = pd; 50 state->pd->pam_status = PAM_SUCCESS; 63 struct dp_access_permit_handler_state *state = NULL; local 65 state = tevent_req_data(req, struct dp_access_permit_handler_state); 69 *_data = talloc_steal(mem_ctx, state->pd); 84 struct dp_access_deny_handler_state *state; local 87 req = tevent_req_create(mem_ctx, &state, 94 state 109 struct dp_access_deny_handler_state *state = NULL; local [all...] |
/sssd/src/providers/ldap/ |
H A D | ldap_access.c | 44 struct sdap_pam_access_handler_state *state; local 48 req = tevent_req_create(mem_ctx, &state, 55 state->pd = pd; 57 subreq = sdap_access_send(state, params->ev, params->be_ctx, 79 struct sdap_pam_access_handler_state *state; local 84 state = tevent_req_data(req, struct sdap_pam_access_handler_state); 91 state->pd->pam_status = PAM_SUCCESS; 94 state->pd->pam_status = PAM_ACCT_EXPIRED; 99 state->pd->pam_status = PAM_PERM_DENIED; 102 state 119 struct sdap_pam_access_handler_state *state = NULL; local [all...] |
H A D | ldap_id_enum.c | 131 struct ldap_enumeration_state *state; local 137 req = tevent_req_create(mem_ctx, &state, 150 state->ectx = ectx; 151 state->dom = ectx->sdom->dom; 152 state->id_ctx = talloc_get_type_abort(ectx->pvt, struct sdap_id_ctx); 154 subreq = sdap_dom_enum_send(state, ev, state->id_ctx, ectx->sdom, 155 state->id_ctx->conn);
|
H A D | sdap_async_groups_ad.c | 59 struct sdap_ad_match_rule_state *state; local 63 req = tevent_req_create(mem_ctx, &state, struct sdap_ad_match_rule_state); 66 state->ev = ev; 67 state->opts = opts; 68 state->sh = sh; 69 state->timeout = timeout; 70 state->count = 0; 71 state->base_iter = 0; 72 state->search_bases = opts->sdom->user_search_bases; 75 ret = build_attrs_from_map(state, opt 139 struct sdap_ad_match_rule_state *state; local 176 struct sdap_ad_match_rule_state *state = local 241 struct sdap_ad_match_rule_state *state = local [all...] |
H A D | sdap_online_check.c | 40 struct sdap_online_check_state *state; local 46 req = tevent_req_create(mem_ctx, &state, struct sdap_online_check_state); 52 state->id_ctx = id_ctx; 53 state->be_ctx = be_ctx = id_ctx->be; 55 subreq = sdap_cli_connect_send(state, be_ctx->ev, id_ctx->opts, be_ctx, 80 struct sdap_online_check_state *state; local 89 state = tevent_req_data(req, struct sdap_online_check_state); 91 id_ctx = state->id_ctx; 93 ret = sdap_cli_connect_recv(subreq, state, &can_retry, NULL, &srv_opts); 125 subreq = sdap_reinit_cleanup_send(state, stat 187 struct sdap_online_check_handler_state *state; local 221 struct sdap_online_check_handler_state *state; local 240 struct sdap_online_check_handler_state *state = NULL; local [all...] |
H A D | sdap_sudo.c | 45 struct sdap_sudo_handler_state *state; local 50 req = tevent_req_create(mem_ctx, &state, struct sdap_sudo_handler_state); 56 state->type = data->type; 61 subreq = sdap_sudo_full_refresh_send(state, sudo_ctx); 65 subreq = sdap_sudo_rules_refresh_send(state, sudo_ctx, data->rules); 84 dp_reply_std_set(&state->reply, DP_ERR_DECIDE, ret, NULL); 95 struct sdap_sudo_handler_state *state; local 102 state = tevent_req_data(req, struct sdap_sudo_handler_state); 104 switch (state->type) { 117 DEBUG(SSSDBG_CRIT_FAILURE, "Invalid request type: %d\n", state 133 struct sdap_sudo_handler_state *state = NULL; local [all...] |
/sssd/src/tests/ |
H A D | common_tev.c | 58 int *state; local 60 req = tevent_req_create(mem_ctx, &state, int);
|
/sssd/src/tests/cwrap/ |
H A D | test_usertools.c | 31 void test_get_user_num(void **state) argument 43 void test_get_user_str(void **state) argument 55 void test_get_user_nullparm(void **state) argument
|
H A D | test_become_user.c | 30 void test_become_user(void **state) argument 73 void test_switch_user(void **state) argument
|
/sssd/src/providers/ad/ |
H A D | ad_dyndns.c | 170 struct ad_dyndns_update_state *state; local 177 req = tevent_req_create(ctx, &state, struct ad_dyndns_update_state); 181 state->ad_ctx = ctx; 191 state->ad_ctx->dyndns_ctx->last_refresh = time(NULL); 219 subreq = sdap_dyndns_update_send(state, sdap_ctx->be->ev,
|
/sssd/src/providers/ipa/ |
H A D | ipa_config.c | 48 struct ipa_get_config_state *state; local 52 req = tevent_req_create(mem_ctx, &state, struct ipa_get_config_state); 58 state->attrs = talloc_zero_array(state, const char *, 4); 59 if (state->attrs == NULL) { 63 state->attrs[0] = IPA_CONFIG_MIGRATION_ENABLED; 64 state->attrs[1] = IPA_CONFIG_SELINUX_DEFAULT_USER_CTX; 65 state->attrs[2] = IPA_CONFIG_SELINUX_MAP_ORDER; 66 state->attrs[3] = NULL; 68 state 114 struct ipa_get_config_state *state = tevent_req_data(req, local 149 struct ipa_get_config_state *state = tevent_req_data(req, local [all...] |
H A D | ipa_dyndns.c | 153 struct ipa_dyndns_update_state *state; local 159 req = tevent_req_create(ctx, &state, struct ipa_dyndns_update_state); 163 state->ipa_ctx = ctx; 193 state->ipa_ctx->dyndns_ctx->last_refresh = time(NULL); 202 subreq = sdap_dyndns_update_send(state, sdap_ctx->be->ev,
|
H A D | ipa_selinux_maps.c | 48 struct ipa_selinux_get_maps_state *state); 61 struct ipa_selinux_get_maps_state *state; local 64 req = tevent_req_create(mem_ctx, &state, struct ipa_selinux_get_maps_state); 69 state->ev = ev; 70 state->sysdb = sysdb; 71 state->sh = sh; 72 state->opts = opts; 73 state->ipa_opts = ipa_opts; 74 state->search_bases = search_bases; 75 state 112 ipa_selinux_get_maps_next(struct tevent_req *req, struct ipa_selinux_get_maps_state *state) argument 155 struct ipa_selinux_get_maps_state *state = tevent_req_data(req, local 213 struct ipa_selinux_get_maps_state *state = local [all...] |
/sssd/src/providers/krb5/ |
H A D | krb5_access.c | 48 struct krb5_access_state *state; local 56 req = tevent_req_create(mem_ctx, &state, struct krb5_access_state); 62 state->ev = ev; 63 state->be_ctx = be_ctx; 64 state->pd = pd; 65 state->krb5_ctx = krb5_ctx; 66 state->access_allowed = false; 74 ret = krb5_setup(state, pd, dom, krb5_ctx, &state->kr); 86 attrs = talloc_array(state, cons 172 struct krb5_access_state *state = tevent_req_data(req, local 211 struct krb5_access_state *state = tevent_req_data(req, local [all...] |
/sssd/src/responder/autofs/ |
H A D | autofssrv_dp.c | 52 struct sss_dp_req_state *state; local 57 req = tevent_req_create(mem_ctx, &state, struct sss_dp_req_state); 67 info = talloc_zero(state, struct sss_dp_get_autofs_info); 73 key = talloc_asprintf(state, "%d:%s@%s", type, name, dom->name); 79 ret = sss_dp_issue_request(state, rctx, key, dom, sss_dp_get_autofs_msg,
|
/sssd/src/responder/ssh/ |
H A D | sshsrv_dp.c | 54 struct sss_dp_req_state *state; local 57 req = tevent_req_create(mem_ctx, &state, struct sss_dp_req_state); 67 info = talloc_zero(state, struct sss_dp_get_ssh_host_info); 74 key = talloc_asprintf(state, "%s:%s@%s", name, alias, dom->name); 76 key = talloc_asprintf(state, "%s@%s", name, dom->name); 83 ret = sss_dp_issue_request(state, rctx, key, dom, sss_dp_get_ssh_host_msg,
|
/sssd/src/tests/cmocka/data_provider/ |
H A D | test_dp_builtin.c | 44 static int test_setup(void **state) argument 68 *state = test_ctx; 73 static int test_teardown(void **state) argument 77 test_ctx = talloc_get_type_abort(*state, struct test_ctx); 85 static void test_deny_handler(void **state) argument 93 test_ctx = talloc_get_type(*state, struct test_ctx); 112 static void test_permit_handler(void **state) argument 120 test_ctx = talloc_get_type(*state, struct test_ctx);
|