/systemd-251/src/home/ |
D | home-util.c | 38 int suitable_realm(const char *realm) { in suitable_realm() argument 44 r = dns_name_normalize(realm, 0, &normalized); /* this also checks general validity */ in suitable_realm() 50 if (!streq(realm, normalized)) /* is this normalized? */ in suitable_realm() 53 if (dns_name_is_root(realm)) /* Don't allow top level domain */ in suitable_realm() 73 _cleanup_free_ char *user_name = NULL, *realm = NULL; in split_user_name_realm() local 91 realm = strdup(c + 1); in split_user_name_realm() 92 if (!realm) in split_user_name_realm() 99 if (realm) { in split_user_name_realm() 100 r = suitable_realm(realm); in split_user_name_realm() 108 *ret_realm = TAKE_PTR(realm); in split_user_name_realm()
|
D | homectl-fido2.c | 125 JsonVariant *un, *realm, *rn; in identity_add_fido2_parameters() local 144 realm = json_variant_by_key(*v, "realm"); in identity_add_fido2_parameters() 145 if (realm) { in identity_add_fido2_parameters() 146 if (!json_variant_is_string(realm)) in identity_add_fido2_parameters() 150 fido_un = strjoina(json_variant_string(un), json_variant_string(realm)); in identity_add_fido2_parameters()
|
D | user-record-util.c | 20 const char *realm, in user_record_synthesize() argument 45 if (realm) { in user_record_synthesize() 46 r = suitable_realm(realm); in user_record_synthesize() 64 if (realm) { in user_record_synthesize() 65 rr = strdup(realm); in user_record_synthesize() 69 user_name_and_realm = strjoin(user_name, "@", realm); in user_record_synthesize() 85 … JSON_BUILD_PAIR_CONDITION(!!rr, "realm", JSON_BUILD_STRING(realm)), in user_record_synthesize() 98 free_and_replace(h->realm, rr); in user_record_synthesize() 128 if (h->realm) { in group_record_synthesize() 129 rr = strdup(h->realm); in group_record_synthesize() [all …]
|
D | homed-manager.c | 656 const char *realm, in manager_add_home_by_image() argument 724 r = user_record_synthesize(hr, user_name, realm, image_path, storage, uid, (gid_t) uid); in manager_add_home_by_image() 841 _cleanup_free_ char *n = NULL, *user_name = NULL, *realm = NULL; in manager_assess_image() local 850 r = split_user_name_realm(n, &user_name, &realm); in manager_assess_image() 856 … return manager_add_home_by_image(m, user_name, realm, path, NULL, USER_LUKS, UID_INVALID); in manager_assess_image() 860 _cleanup_free_ char *n = NULL, *user_name = NULL, *realm = NULL; in manager_assess_image() local 871 r = split_user_name_realm(n, &user_name, &realm); in manager_assess_image() 912 … return manager_add_home_by_image(m, user_name, realm, path, NULL, storage, st.st_uid); in manager_assess_image() 1213 _cleanup_free_ char *user_name = NULL, *realm = NULL, *node = NULL; in manager_add_device() local 1250 r = split_user_name_realm(partname, &user_name, &realm); in manager_add_device() [all …]
|
D | home-util.h | 24 int suitable_realm(const char *realm);
|
D | user-record-util.h | 9 int user_record_synthesize(UserRecord *h, const char *user_name, const char *realm, const char *ima…
|
D | homed-home.c | 83 if (hr->realm) { in suitable_home_record() 84 r = suitable_realm(hr->realm); in suitable_home_record()
|
/systemd-251/src/shared/ |
D | group-record.c | 30 free(g->realm); in group_record_free() 178 if (!h->group_name_and_realm_auto && h->realm) { in group_record_augment() 179 h->group_name_and_realm_auto = strjoin(h->group_name, "@", h->realm); in group_record_augment() 194 …N_VARIANT_STRING, json_dispatch_realm, offsetof(GroupRecord, realm), 0 … in group_record_load() 297 assert(!h->realm); in group_record_group_name_and_realm()
|
D | group-record.h | 13 char *realm; member
|
D | user-record.c | 132 free(h->realm); in user_record_free() 1354 if (!h->user_name_and_realm_auto && h->realm) { in user_record_augment() 1355 h->user_name_and_realm_auto = strjoin(h->user_name, "@", h->realm); in user_record_augment() 1506 …STRING, json_dispatch_realm, offsetof(UserRecord, realm), … in user_record_load() 1669 assert(!h->realm); in user_record_user_name_and_realm() 2029 streq_ptr(a->realm, b->realm); in user_record_compatible()
|
D | user-record.h | 238 char *realm; member
|
/systemd-251/docs/ |
D | GROUP_RECORD.md | 23 `realm` → The "realm" the group belongs to, conceptually identical to the same
|
D | USER_RECORD.md | 220 `realm` → The "realm" a user is defined in. This concept allows distinguishing 224 this). The idea is that the user `lpoetter` in the `redhat.com` realm might be 225 distinct from the same user in the `poettering.hq` realm. User records for the 226 same user name that have different realm fields are considered referring to 228 version has to match in both `userName` and `realm` field. This field is 229 optional, when unset the user should not be considered part of any realm. A 230 user record with a realm set is never compatible (for the purpose of updates,
|
/systemd-251/shell-completion/bash/ |
D | homectl | 50 --realm
|