/sssd/src/util/ |
H A D | sss_sockets.c | 233 int sd; member in struct:sssd_async_socket_state 254 state->sd = -1; 259 state->sd = socket(addr->ss_family, SOCK_STREAM, 0); 260 if (state->sd == -1) { 267 ret = set_fd_common_opts(state->sd); 273 ret = set_fcntl_flags(state->sd, FD_CLOEXEC, O_NONBLOCK); 280 "Using file descriptor [%d] for the connection.\n", state->sd); 282 subreq = sssd_async_connect_send(state, ev, state->sd, 339 int sssd_async_socket_init_recv(struct tevent_req *req, int *sd) argument 346 /* steal the sd an [all...] |
H A D | sss_sockets.h | 37 int sssd_async_socket_init_recv(struct tevent_req *req, int *sd);
|
H A D | sss_ldap.c | 114 int sd; member in struct:sss_ldap_init_state 124 "calling ldap_unbind_ext for ldap:[%p] sd:[%d]\n", 125 state->ldap, state->sd); 128 if (state->sd != -1) { 129 DEBUG(SSSDBG_TRACE_FUNC, "closing socket [%d]\n", state->sd); 130 close(state->sd); 131 state->sd = -1; 157 state->sd = -1; 208 ret = sssd_async_socket_init_recv(subreq, &state->sd); 218 lret = ldap_init_fd(state->sd, LDAP_PROTO_TC 264 sss_ldap_init_recv(struct tevent_req *req, LDAP **ldap, int *sd) argument [all...] |
H A D | sss_ldap.h | 82 int sss_ldap_init_recv(struct tevent_req *req, LDAP **ldap, int *sd);
|
H A D | sss_log.c | 28 #include <systemd/sd-journal.h>
|
H A D | find_uid.c | 45 #include <systemd/sd-login.h>
|
H A D | debug.c | 34 #include <systemd/sd-journal.h>
|
/sssd/src/sss_client/ |
H A D | common.c | 536 int sd; local 543 sd = socket(AF_UNIX, SOCK_STREAM, 0); 544 if (sd == -1) { 551 sd = make_safe_fd(sd); 552 if (sd == -1) { 567 ret = connect(sd, (struct sockaddr *)&nssaddr, 576 pfd.fd = sd; 583 ret = getsockopt(sd, SOL_SOCKET, SO_ERROR, 614 close(sd); [all...] |
/sssd/src/providers/ipa/ |
H A D | ipa_subdomains.h | 81 errno_t ipa_server_get_trust_direction(struct sysdb_attrs *sd,
|
H A D | ipa_subdomains_server.c | 45 struct sss_domain_info *sd) 47 if (sd->parent->flat_name == NULL) { 49 "Unknown flat name for parent %s\n", sd->parent->name); 54 sd->parent->flat_name, forest_realm); 84 errno_t ipa_server_get_trust_direction(struct sysdb_attrs *sd, argument 92 ret = sysdb_attrs_get_uint32_t(sd, IPA_TRUST_DIRECTION, 97 direction = default_direction(sd, ldb_ctx, sd); 43 subdomain_trust_princ(TALLOC_CTX *mem_ctx, const char *forest_realm, struct sss_domain_info *sd) argument
|
H A D | ipa_subdomains.c | 362 static errno_t ipa_get_sd_trust_direction(struct sysdb_attrs *sd, argument 368 return ipa_server_get_trust_direction(sd, ldb_ctx, _direction);
|
/sssd/src/responder/secrets/ |
H A D | proxy.c | 346 int sd; member in struct:proxy_http_req_state 377 state->sd = -1; 550 ret = sssd_async_socket_init_recv(subreq, &state->sd); 565 state->fde = tevent_add_fd(state->ev, state, state->sd, 604 if (state->sd != -1) { 605 DEBUG(SSSDBG_TRACE_FUNC, "closing socket [%d]\n", state->sd); 606 close(state->sd); 607 state->sd = -1; 641 ret = proxy_wire_send(state->sd, &state->request); 845 ret = sec_recv_data(state->sd, [all...] |
/sssd/src/providers/ad/ |
H A D | ad_id.c | 510 static errno_t ad_enum_sdom(struct tevent_req *req, struct sdap_domain *sd, 654 struct sdap_domain *sd, 673 sd, 999 struct sdap_domain *sd; local 1008 sd = sdap_domain_get_by_dn(opts, member); 1009 if (sd == NULL) { 1024 base_dn = sysdb_domain_dn(tmp_ctx, sd->dom); 1030 ret = sysdb_search_entry(tmp_ctx, sd->dom->sysdb, base_dn, 653 ad_enum_sdom(struct tevent_req *req, struct sdap_domain *sd, struct ad_id_ctx *id_ctx) argument
|
H A D | ad_subdomains.c | 506 size_t nsd, struct sysdb_attrs **sd, 518 /* We are connected directly to the root domain. The 'sd' 522 *_sd_out = sd; 538 ret = sysdb_attrs_get_string(sd[i], AD_AT_TRUST_PARTNER, &sd_name); 558 sd_out[sdi] = talloc_steal(sd_out, sd[i]); 503 ad_subdomains_process(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char **enabled_domains_list, size_t nsd, struct sysdb_attrs **sd, struct sysdb_attrs *root, size_t *_nsd_out, struct sysdb_attrs ***_sd_out) argument
|
H A D | ad_gpo.c | 830 struct security_descriptor *sd = NULL; local 867 sd = candidate_gpo->gpo_sd; 893 if ((!(sd->type & SEC_DESC_DACL_PRESENT)) || (dacl == NULL)) { 3485 struct security_descriptor sd; local 3500 &sd); 3507 *_gpo_sd = talloc_memdup(mem_ctx, &sd, sizeof(struct security_descriptor));
|
/sssd/src/providers/ldap/ |
H A D | sdap_async_connection.c | 146 int sd; local 152 ret = sss_ldap_init_recv(subreq, &state->sh->ldap, &sd); 173 if (sd != -1) { 174 ret = sdap_call_conn_cb(state->uri, sd, state->sh);
|
/sssd/src/responder/common/ |
H A D | responder_common.c | 48 #include <systemd/sd-daemon.h>
|