/sssd/src/util/ |
H A D | sss_nss.h | 31 uint32_t uid; member in struct:sss_nss_homedir_ctx
|
H A D | become_user.c | 28 errno_t become_user(uid_t uid, gid_t gid) argument 34 "Trying to become user [%"SPRIuid"][%"SPRIgid"].\n", uid, gid); 38 if (uid == cuid) { 39 DEBUG(SSSDBG_FUNC_DATA, "Already user [%"SPRIuid"].\n", uid); 61 /* change uid so that root cannot be regained (changes saved uid too) */ 63 ret = setresuid(uid, uid, uid); 75 uid_t uid; member in struct:sss_creds 85 switch_creds(TALLOC_CTX *mem_ctx, uid_t uid, gid_t gid, int num_gids, gid_t *gids, struct sss_creds **saved_creds) argument [all...] |
H A D | check_and_open.c | 33 uid_t uid, gid_t gid, 37 uid_t uid, uid_t gid, mode_t mode, mode_t mask, 61 return perform_checks(stat_buf, uid, gid, mode, mask); 64 errno_t check_fd(int fd, uid_t uid, gid_t gid, argument 86 return perform_checks(stat_buf, uid, gid, mode, mask); 90 uid_t uid, gid_t gid, 114 if (uid != (uid_t)(-1) && stat_buf->st_uid != uid) { 115 DEBUG(SSSDBG_TRACE_LIBS, "File must be owned by uid [%d].\n", uid); 36 check_file(const char *filename, uid_t uid, uid_t gid, mode_t mode, mode_t mask, struct stat *caller_stat_buf, bool follow_symlink) argument 89 perform_checks(struct stat *stat_buf, uid_t uid, gid_t gid, mode_t mode, mode_t mask) argument 127 check_and_open_readonly(const char *filename, int *fd, uid_t uid, gid_t gid, mode_t mode, mode_t mask) argument [all...] |
/sssd/src/providers/data_provider/ |
H A D | dp.c | 43 provider->uid, provider->gid, true, 72 uid_t uid, 85 provider->uid = uid; 70 dp_init(struct tevent_context *ev, struct be_ctx *be_ctx, uid_t uid, gid_t gid) argument
|
/sssd/src/responder/common/ |
H A D | negcache_files.c | 54 bool is_user_local_by_uid(uid_t uid) argument 62 ret = getpwuid_r(uid, &pwd, buffer, BUFFER_SIZE, &pwd_result); 65 "User with UID %"SPRIuid" is a local user\n", uid);
|
/sssd/src/tests/cmocka/ |
H A D | test_find_uid.c | 40 uid_t uid; local 43 uid = getuid(); 45 ret = check_if_uid_is_active(uid, &result); 53 uid_t uid; local 56 uid = (uid_t) -7; 58 ret = check_if_uid_is_active(uid, &result); 66 uid_t uid; local 78 uid = getuid(); 80 key.ul = (unsigned long) uid; 86 uid [all...] |
/sssd/src/tests/cwrap/ |
H A D | test_usertools.c | 33 uid_t uid; local 37 ret = sss_user_by_name_or_uid("123", &uid, &gid); 39 assert_int_equal(uid, 123); 45 uid_t uid; local 49 ret = sss_user_by_name_or_uid("sssd", &uid, &gid); 51 assert_int_equal(uid, 123); 57 uid_t uid; local 61 ret = sss_user_by_name_or_uid("sssd", &uid, NULL); 63 assert_int_equal(uid, 123);
|
/sssd/src/tests/ |
H A D | find_uid-tests.c | 37 uid_t uid; local 41 uid = getuid(); 43 ret = check_if_uid_is_active(uid, &result); 45 fail_unless(result, "check_if_uid_is_active did not found my uid [%d]", 46 uid); 52 uid_t uid; local 56 uid = (uid_t) -4; 58 ret = check_if_uid_is_active(uid, &result); 61 "uid [%d]", uid); 67 uid_t uid; local [all...] |
H A D | check_and_open-tests.c | 38 uid_t uid; variable 57 uid = getuid(); 83 uid, gid, S_IFREG|mode, 0); 108 ret = check_file(newpath, uid, gid, S_IFREG|mode, 0, NULL, false); 135 ret = check_file(newpath, uid, gid, S_IFREG|mode, 0, NULL, true); 148 ret = check_and_open_readonly("/dev/null", &fd, uid, gid, S_IFREG|mode, 0); 159 ret = check_and_open_readonly(filename, &fd, uid+1, gid, S_IFREG|mode, 0); 161 "check_and_open_readonly succeeded with wrong uid"); 170 ret = check_and_open_readonly(filename, &fd, uid, gid+1, S_IFREG|mode, 0); 182 uid, gi [all...] |
H A D | responder_socket_access-tests.c | 95 uid_t uid; member in struct:uid_check_data 116 ret = check_allowed_uids(uid_check_data[c].uid,
|
/sssd/src/responder/sudo/ |
H A D | sudosrv_private.h | 59 uid_t uid; member in struct:sudo_cmd_ctx 73 uid_t uid,
|
H A D | sudosrv.c | 172 uid_t uid; local 178 SSSD_SERVER_OPTS(uid, gid) 205 ret = server_setup("sssd[sudo]", 0, uid, gid, CONFDB_SUDO_CONF_ENTRY,
|
/sssd/src/sss_client/libwbclient/ |
H A D | wbc_idmap_common.c | 26 /* Convert a Windows SID to a Unix uid if there already is a mapping */ 33 /* Convert a Unix uid to a Windows SID if there already is a mapping */ 34 wbcErr wbcQueryUidToSid(uid_t uid, argument 56 wbcErr wbcSetUidMapping(uid_t uid, const struct wbcDomainSid *sid) argument 68 wbcErr wbcRemoveUidMapping(uid_t uid, const struct wbcDomainSid *sid) argument
|
H A D | wbc_idmap_sssd.c | 29 /* Convert a Windows SID to a Unix uid, allocating an uid if needed */ 58 /* Convert a Unix uid to a Windows SID, allocating a SID if needed */ 59 wbcErr wbcUidToSid(uid_t uid, struct wbcDomainSid *sid) argument 66 ret = sss_nss_getsidbyid(uid, &str_sid, &type); 149 /* Obtain a new uid from Winbind */ 188 ids[c].id.uid = (uid_t) id; 196 ids[c].id.uid = (uid_t) id; 215 wbc_status = wbcUidToSid(ids[c].id.uid, &sids[c]);
|
H A D | wbc_pam_sssd.c | 105 uid_t uid, 104 wbcLogoffUser(const char *username, uid_t uid, const char *ccfilename) argument
|
/sssd/src/sss_client/sudo_testcli/ |
H A D | sudo_testcli.c | 46 uid_t uid = 0; local 50 fprintf(stderr, "Usage: sss_sudo_cli username [uid]\n"); 56 uid = atoi(argv[2]); 63 uid = passwd->pw_uid; 70 ret = sss_sudo_send_recv_defaults(uid, username, &error, 79 username, (unsigned long long)uid, 93 ret = sss_sudo_send_recv(uid, username, domainname, &error, &result);
|
/sssd/src/responder/common/cache_req/plugins/ |
H A D | cache_req_user_by_id.c | 133 uid_t uid) 137 data = cache_req_data_id(mem_ctx, CACHE_REQ_USER_BY_ID, uid); 127 cache_req_user_by_id_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_nc_ctx *ncache, int cache_refresh_percent, const char *domain, uid_t uid) argument
|
/sssd/src/responder/secrets/ |
H A D | secsrv.c | 185 uid_t uid; local 191 SSSD_SERVER_OPTS(uid, gid) 218 ret = server_setup("sssd[secrets]", 0, uid, gid, CONFDB_SEC_CONF_ENTRY,
|
/sssd/src/responder/ssh/ |
H A D | sshsrv.c | 182 uid_t uid; local 188 SSSD_SERVER_OPTS(uid, gid) 215 ret = server_setup("sssd[ssh]", 0, uid, gid,
|
/sssd/src/sss_client/ |
H A D | nss_mc_passwd.c | 62 result->pw_uid = data->uid; 178 errno_t sss_nss_mc_getpwuid(uid_t uid, argument 195 len = snprintf(uidstr, 11, "%ld", (long)uid); 220 /* if uid hash does not match we can skip this immediately */ 226 if (uid == data->uid) {
|
/sssd/src/tools/ |
H A D | sss_userdel.c | 52 static int is_logged_in(TALLOC_CTX *mem_ctx, uid_t uid) argument 67 key.ul = (unsigned long) uid; 232 if ((tctx->octx->uid < tctx->local->id_min) || 233 (tctx->local->id_max && tctx->octx->uid > tctx->local->id_max)) { 265 ret = is_logged_in(tctx, tctx->octx->uid); 271 ERROR("WARNING: The user (uid %1$lu) was still logged in when " 272 "deleted.\n", (unsigned long) tctx->octx->uid); 305 tctx->octx->uid,
|
H A D | sss_sync_ops.h | 41 uid_t uid; member in struct:ops_ctx
|
/sssd/src/lib/sifp/ |
H A D | sss_sifp_common.c | 165 uid_t uid, 168 uint64_t _uid = uid; 164 sss_sifp_fetch_user_by_uid(sss_sifp_ctx *ctx, uid_t uid, sss_sifp_object **_user) argument
|
/sssd/src/providers/krb5/ |
H A D | krb5_auth.h | 41 #define CHILD_OPT_FAST_CCACHE_UID "fast-ccache-uid" 58 uid_t uid; member in struct:krb5child_req 122 uid_t uid);
|
H A D | krb5_delayed_online_authentication.c | 238 uid_t uid) 299 key.ul = uid; 236 add_user_to_delayed_online_authentication(struct krb5_ctx *krb5_ctx, struct pam_data *pd, uid_t uid) argument
|