sssd  2.2.2
sss_cli.h
1 /*
2  SSSD
3 
4  Client Interface for NSS and PAM.
5 
6  Authors:
7  Simo Sorce <ssorce@redhat.com>
8 
9  Copyright (C) Red Hat, Inc 2007
10 
11  This program is free software; you can redistribute it and/or modify
12  it under the terms of the GNU Lesser General Public License as published by
13  the Free Software Foundation; either version 3 of the License, or
14  (at your option) any later version.
15 
16  This program is distributed in the hope that it will be useful,
17  but WITHOUT ANY WARRANTY; without even the implied warranty of
18  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19  GNU Lesser General Public License for more details.
20 
21  You should have received a copy of the GNU Lesser General Public License
22  along with this program. If not, see <http://www.gnu.org/licenses/>.
23 */
24 
25 #ifndef _SSSCLI_H
26 #define _SSSCLI_H
27 
28 #include <nss.h>
29 #include <pwd.h>
30 #include <grp.h>
31 #include <string.h>
32 #include <stdint.h>
33 #include <limits.h>
34 
35 #include "shared/safealign.h"
36 
37 #ifndef HAVE_ERRNO_T
38 #define HAVE_ERRNO_T
39 typedef int errno_t;
40 #endif
41 
42 
43 #ifndef EOK
44 #define EOK 0
45 #endif
46 
47 #define SSS_NSS_PROTOCOL_VERSION 1
48 #define SSS_PAM_PROTOCOL_VERSION 3
49 #define SSS_SUDO_PROTOCOL_VERSION 1
50 #define SSS_AUTOFS_PROTOCOL_VERSION 1
51 #define SSS_SSH_PROTOCOL_VERSION 0
52 #define SSS_PAC_PROTOCOL_VERSION 1
53 
54 #ifdef LOGIN_NAME_MAX
55 #define SSS_NAME_MAX LOGIN_NAME_MAX
56 #else
57 #define SSS_NAME_MAX 256
58 #endif
59 
68 /* null */
69  SSS_CLI_NULL = 0x0000,
70 
71 /* version */
72  SSS_GET_VERSION = 0x0001,
73 
74 /* passwd */
75 
76  SSS_NSS_GETPWNAM = 0x0011,
77  SSS_NSS_GETPWUID = 0x0012,
78  SSS_NSS_SETPWENT = 0x0013,
79  SSS_NSS_GETPWENT = 0x0014,
80  SSS_NSS_ENDPWENT = 0x0015,
81 
82  SSS_NSS_GETPWNAM_EX = 0x0019,
83  SSS_NSS_GETPWUID_EX = 0x001A,
84 
85 /* group */
86 
87  SSS_NSS_GETGRNAM = 0x0021,
88  SSS_NSS_GETGRGID = 0x0022,
89  SSS_NSS_SETGRENT = 0x0023,
90  SSS_NSS_GETGRENT = 0x0024,
91  SSS_NSS_ENDGRENT = 0x0025,
92  SSS_NSS_INITGR = 0x0026,
93 
94  SSS_NSS_GETGRNAM_EX = 0x0029,
95  SSS_NSS_GETGRGID_EX = 0x002A,
96  SSS_NSS_INITGR_EX = 0x002E,
97 
98 #if 0
99 /* aliases */
100 
101  SSS_NSS_GETALIASBYNAME = 0x0031,
102  SSS_NSS_GETALIASBYPORT = 0x0032,
103  SSS_NSS_SETALIASENT = 0x0033,
104  SSS_NSS_GETALIASENT = 0x0034,
105  SSS_NSS_ENDALIASENT = 0x0035,
106 
107 /* ethers */
108 
109  SSS_NSS_GETHOSTTON = 0x0041,
110  SSS_NSS_GETNTOHOST = 0x0042,
111  SSS_NSS_SETETHERENT = 0x0043,
112  SSS_NSS_GETETHERENT = 0x0044,
113  SSS_NSS_ENDETHERENT = 0x0045,
114 
115 /* hosts */
116 
117  SSS_NSS_GETHOSTBYNAME = 0x0051,
118  SSS_NSS_GETHOSTBYNAME2 = 0x0052,
119  SSS_NSS_GETHOSTBYADDR = 0x0053,
120  SSS_NSS_SETHOSTENT = 0x0054,
121  SSS_NSS_GETHOSTENT = 0x0055,
122  SSS_NSS_ENDHOSTENT = 0x0056,
123 #endif
124 /* netgroup */
125 
126  SSS_NSS_SETNETGRENT = 0x0061,
127  SSS_NSS_GETNETGRENT = 0x0062,
128  SSS_NSS_ENDNETGRENT = 0x0063,
129  /* SSS_NSS_INNETGR = 0x0064, */
130 #if 0
131 /* networks */
132 
133  SSS_NSS_GETNETBYNAME = 0x0071,
134  SSS_NSS_GETNETBYADDR = 0x0072,
135  SSS_NSS_SETNETENT = 0x0073,
136  SSS_NSS_GETNETENT = 0x0074,
137  SSS_NSS_ENDNETENT = 0x0075,
138 
139 /* protocols */
140 
141  SSS_NSS_GETPROTOBYNAME = 0x0081,
142  SSS_NSS_GETPROTOBYNUM = 0x0082,
143  SSS_NSS_SETPROTOENT = 0x0083,
144  SSS_NSS_GETPROTOENT = 0x0084,
145  SSS_NSS_ENDPROTOENT = 0x0085,
146 
147 /* rpc */
148 
149  SSS_NSS_GETRPCBYNAME = 0x0091,
150  SSS_NSS_GETRPCBYNUM = 0x0092,
151  SSS_NSS_SETRPCENT = 0x0093,
152  SSS_NSS_GETRPCENT = 0x0094,
153  SSS_NSS_ENDRPCENT = 0x0095,
154 #endif
155 
156 /* services */
157 
158  SSS_NSS_GETSERVBYNAME = 0x00A1,
159  SSS_NSS_GETSERVBYPORT = 0x00A2,
160  SSS_NSS_SETSERVENT = 0x00A3,
161  SSS_NSS_GETSERVENT = 0x00A4,
162  SSS_NSS_ENDSERVENT = 0x00A5,
163 
164 #if 0
165 /* shadow */
166 
167  SSS_NSS_GETSPNAM = 0x00B1,
168  SSS_NSS_GETSPUID = 0x00B2,
169  SSS_NSS_SETSPENT = 0x00B3,
170  SSS_NSS_GETSPENT = 0x00B4,
171  SSS_NSS_ENDSPENT = 0x00B5,
172 #endif
173 
174 /* SUDO */
175  SSS_SUDO_GET_SUDORULES = 0x00C1,
176  SSS_SUDO_GET_DEFAULTS = 0x00C2,
177 
178 /* autofs */
179  SSS_AUTOFS_SETAUTOMNTENT = 0x00D1,
180  SSS_AUTOFS_GETAUTOMNTENT = 0x00D2,
181  SSS_AUTOFS_GETAUTOMNTBYNAME = 0x00D3,
182  SSS_AUTOFS_ENDAUTOMNTENT = 0x00D4,
183 
184 /* SSH */
185  SSS_SSH_GET_USER_PUBKEYS = 0x00E1,
186  SSS_SSH_GET_HOST_PUBKEYS = 0x00E2,
187 
188 /* PAM related calls */
210  SSS_PAM_SETCRED = 0x00F2,
212  SSS_PAM_ACCT_MGMT = 0x00F3,
218  SSS_PAM_CHAUTHTOK = 0x00F6,
227  SSS_CMD_RENEW = 0x00F8,
230  SSS_PAM_PREAUTH = 0x00F9,
235 /* PAC responder calls */
236  SSS_PAC_ADD_PAC_USER = 0x0101,
237 
238 /* ID-SID mapping calls */
283 };
284  /* end of group sss_cli_command */
288 
289  /* end of group sss_pam */
310 
346 };
347  /* end of group sss_authtok_type */
351 
352 #define SSS_START_OF_PAM_REQUEST 0x4d415049
353 #define SSS_END_OF_PAM_REQUEST 0x4950414d
354 
355 #define PAM_PREAUTH_INDICATOR PUBCONF_PATH"/pam_preauth_available"
356 
357 enum pam_item_type {
358  SSS_PAM_ITEM_EMPTY = 0x0000,
359  SSS_PAM_ITEM_USER,
360  SSS_PAM_ITEM_SERVICE,
361  SSS_PAM_ITEM_TTY,
362  SSS_PAM_ITEM_RUSER,
363  SSS_PAM_ITEM_RHOST,
364  SSS_PAM_ITEM_AUTHTOK,
365  SSS_PAM_ITEM_NEWAUTHTOK,
366  SSS_PAM_ITEM_CLI_LOCALE,
367  SSS_PAM_ITEM_CLI_PID,
368  SSS_PAM_ITEM_REQUESTED_DOMAINS,
369  SSS_PAM_ITEM_FLAGS,
370 };
371 
372 #define PAM_CLI_FLAGS_USE_FIRST_PASS (1 << 0)
373 #define PAM_CLI_FLAGS_FORWARD_PASS (1 << 1)
374 #define PAM_CLI_FLAGS_USE_AUTHTOK (1 << 2)
375 #define PAM_CLI_FLAGS_IGNORE_UNKNOWN_USER (1 << 3)
376 #define PAM_CLI_FLAGS_IGNORE_AUTHINFO_UNAVAIL (1 << 4)
377 #define PAM_CLI_FLAGS_USE_2FA (1 << 5)
378 #define PAM_CLI_FLAGS_ALLOW_MISSING_NAME (1 << 6)
379 #define PAM_CLI_FLAGS_PROMPT_ALWAYS (1 << 7)
380 #define PAM_CLI_FLAGS_TRY_CERT_AUTH (1 << 8)
381 #define PAM_CLI_FLAGS_REQUIRE_CERT_AUTH (1 << 9)
382 
383 #define SSS_NSS_MAX_ENTRIES 256
384 #define SSS_NSS_HEADER_SIZE (sizeof(uint32_t) * 4)
385 struct sss_cli_req_data {
386  size_t len;
387  const void *data;
388 };
389 
390 /* this is in milliseconds, wait up to 300 seconds */
391 #define SSS_CLI_SOCKET_TIMEOUT 300000
392 
393 enum sss_status {
394  SSS_STATUS_TRYAGAIN,
395  SSS_STATUS_UNAVAIL,
396  SSS_STATUS_SUCCESS
397 };
398 
487 };
488 
569 }; /* end of group user_info_type */
573  /* end of group response_type */
577  /* end of group sss_pam_cli */
581 
582 
583 enum prompt_config_type {
584  PC_TYPE_INVALID = 0,
585  PC_TYPE_PASSWORD,
586  PC_TYPE_2FA,
587  PC_TYPE_2FA_SINGLE,
588  PC_TYPE_SC_PIN,
589  PC_TYPE_LAST
590 };
591 
592 struct prompt_config;
593 
594 enum prompt_config_type pc_get_type(struct prompt_config *pc);
595 const char *pc_get_password_prompt(struct prompt_config *pc);
596 const char *pc_get_2fa_1st_prompt(struct prompt_config *pc);
597 const char *pc_get_2fa_2nd_prompt(struct prompt_config *pc);
598 const char *pc_get_2fa_single_prompt(struct prompt_config *pc);
599 void pc_list_free(struct prompt_config **pc_list);
600 errno_t pc_list_add_password(struct prompt_config ***pc_list,
601  const char *prompt);
602 errno_t pc_list_add_2fa(struct prompt_config ***pc_list,
603  const char *prompt_1st, const char *prompt_2nd);
604 errno_t pc_list_add_2fa_single(struct prompt_config ***pc_list,
605  const char *prompt);
606 errno_t pam_get_response_prompt_config(struct prompt_config **pc_list, int *len,
607  uint8_t **data);
608 errno_t pc_list_from_response(int size, uint8_t *buf,
609  struct prompt_config ***pc_list);
610 
611 enum sss_netgr_rep_type {
612  SSS_NETGR_REP_TRIPLE = 1,
613  SSS_NETGR_REP_GROUP
614 };
615 
616 enum sss_cli_error_codes {
617  ESSS_SSS_CLI_ERROR_START = 0x1000,
618  ESSS_BAD_PRIV_SOCKET,
619  ESSS_BAD_PUB_SOCKET,
620  ESSS_BAD_CRED_MSG,
621  ESSS_SERVER_NOT_TRUSTED,
622  ESSS_NO_SOCKET,
623  ESSS_SOCKET_STAT_ERROR,
624 
625  ESS_SSS_CLI_ERROR_MAX
626 };
627 
628 const char *ssscli_err2string(int err);
629 
630 enum nss_status sss_nss_make_request(enum sss_cli_command cmd,
631  struct sss_cli_req_data *rd,
632  uint8_t **repbuf, size_t *replen,
633  int *errnop);
634 
635 enum nss_status sss_nss_make_request_timeout(enum sss_cli_command cmd,
636  struct sss_cli_req_data *rd,
637  int timeout,
638  uint8_t **repbuf, size_t *replen,
639  int *errnop);
640 
641 int sss_pam_make_request(enum sss_cli_command cmd,
642  struct sss_cli_req_data *rd,
643  uint8_t **repbuf, size_t *replen,
644  int *errnop);
645 void sss_pam_close_fd(void);
646 
647 /* Checks access to the PAC responder and opens the socket, if available.
648  * Required for processes like krb5_child that need to open the socket
649  * before dropping privs.
650  */
651 int sss_pac_check_and_open(void);
652 
653 int sss_pac_make_request(enum sss_cli_command cmd,
654  struct sss_cli_req_data *rd,
655  uint8_t **repbuf, size_t *replen,
656  int *errnop);
657 
658 int sss_pac_make_request_with_lock(enum sss_cli_command cmd,
659  struct sss_cli_req_data *rd,
660  uint8_t **repbuf, size_t *replen,
661  int *errnop);
662 
663 int sss_sudo_make_request(enum sss_cli_command cmd,
664  struct sss_cli_req_data *rd,
665  uint8_t **repbuf, size_t *replen,
666  int *errnop);
667 
668 int sss_autofs_make_request(enum sss_cli_command cmd,
669  struct sss_cli_req_data *rd,
670  uint8_t **repbuf, size_t *replen,
671  int *errnop);
672 
673 int sss_ssh_make_request(enum sss_cli_command cmd,
674  struct sss_cli_req_data *rd,
675  uint8_t **repbuf, size_t *replen,
676  int *errnop);
677 
678 #if 0
679 
680 /* GETSPNAM Request:
681  *
682  * 0-X: string with name
683  *
684  * Replies:
685  *
686  * 0-3: 32bit unsigned number of results
687  * 4-7: 32bit unsigned (reserved/padding)
688  * For each result:
689  * 0-7: 64bit unsigned with Date of last change
690  * 8-15: 64bit unsigned with Min #days between changes
691  * 16-23: 64bit unsigned with Max #days between changes
692  * 24-31: 64bit unsigned with #days before pwd expires
693  * 32-39: 64bit unsigned with #days after pwd expires until account is disabled
694  * 40-47: 64bit unsigned with expiration date in days since 1970-01-01
695  * 48-55: 64bit unsigned (flags/reserved)
696  * 56-X: sequence of 2, 0 terminated, strings (name, pwd) 64bit padded
697  */
698 #endif
699 
700 /* Return strlen(str) or maxlen, whichever is shorter
701  * Returns EINVAL if str is NULL, EFBIG if str is longer than maxlen
702  * _len will return the result
703  */
704 errno_t sss_strnlen(const char *str, size_t maxlen, size_t *len);
705 
706 void sss_nss_lock(void);
707 void sss_nss_unlock(void);
708 void sss_pam_lock(void);
709 void sss_pam_unlock(void);
710 void sss_nss_mc_lock(void);
711 void sss_nss_mc_unlock(void);
712 void sss_pac_lock(void);
713 void sss_pac_unlock(void);
714 
715 errno_t sss_readrep_copy_string(const char *in,
716  size_t *offset,
717  size_t *slen,
718  size_t *dlen,
719  char **out,
720  size_t *size);
721 
722 #endif /* _SSSCLI_H */
SSS_PAM_OTP_INFO
@ SSS_PAM_OTP_INFO
A message which optionally may contain the name of the vendor, the ID of an OTP token and a challenge...
Definition: sss_cli.h:454
SSS_PAM_SETCRED
@ SSS_PAM_SETCRED
see pam_sm_setcred(3) for details
Definition: sss_cli.h:210
SSS_PAM_PREAUTH
@ SSS_PAM_PREAUTH
Request which can be run before an authentication request to find out which authentication methods ar...
Definition: sss_cli.h:230
SSS_PAM_OPEN_SESSION
@ SSS_PAM_OPEN_SESSION
see pam_sm_open_session(3) for details
Definition: sss_cli.h:214
SSS_PAM_USER_INFO_OFFLINE_AUTH_DELAYED
@ SSS_PAM_USER_INFO_OFFLINE_AUTH_DELAYED
Tell the user how low a new authentication is delayed.
Definition: sss_cli.h:527
SSS_NSS_GETSIDBYNAME
@ SSS_NSS_GETSIDBYNAME
Takes a zero terminated fully qualified name and returns the zero terminated string representation of...
Definition: sss_cli.h:239
SSS_NSS_GETSIDBYGID
@ SSS_NSS_GETSIDBYGID
Takes an unsigned 32bit integer (POSIX GID) and reurn the zero terminated string representation of th...
Definition: sss_cli.h:279
SSS_PAM_USER_INFO_GRACE_LOGIN
@ SSS_PAM_USER_INFO_GRACE_LOGIN
Warn the user that the password is expired and inform about the remaining number of grace logins.
Definition: sss_cli.h:551
SSS_CMD_RENEW
@ SSS_CMD_RENEW
Renew a credential with a limited lifetime, e.g.
Definition: sss_cli.h:227
sss_authtok_type
sss_authtok_type
The different types of authentication tokens.
Definition: sss_cli.h:323
SSS_PAM_ENV_ITEM
@ SSS_PAM_ENV_ITEM
Set and environment variable with pam_putenv(3).
Definition: sss_cli.h:436
SSS_NSS_GETSIDBYID
@ SSS_NSS_GETSIDBYID
Takes an unsigned 32bit integer (POSIX ID) and returns the zero terminated string representation of t...
Definition: sss_cli.h:243
SSS_PAM_PROMPT_CONFIG
@ SSS_PAM_PROMPT_CONFIG
Contains data which controls which credentials are expected and how the user is prompted for them.
Definition: sss_cli.h:484
SSS_PAM_AUTHENTICATE
@ SSS_PAM_AUTHENTICATE
see pam_sm_authenticate(3) for details.
Definition: sss_cli.h:189
SSS_ALL_ENV_ITEM
@ SSS_ALL_ENV_ITEM
Set and environment variable with putenv(3) and pam_putenv(3).
Definition: sss_cli.h:442
SSS_AUTHTOK_TYPE_SC_PIN
@ SSS_AUTHTOK_TYPE_SC_PIN
Authentication token is a Smart Card PIN, it may or may no contain a trailing \0.
Definition: sss_cli.h:336
SSS_PAM_CHAUTHTOK_PRELIM
@ SSS_PAM_CHAUTHTOK_PRELIM
first run of the password change operation where the PAM_PRELIM_CHECK flag is set,...
Definition: sss_cli.h:223
SSS_PAM_USER_INFO_OFFLINE_AUTH
@ SSS_PAM_USER_INFO_OFFLINE_AUTH
Inform the user that the authentication happened offline.
Definition: sss_cli.h:516
SSS_PAM_CHAUTHTOK
@ SSS_PAM_CHAUTHTOK
second run of the password change operation where the PAM_UPDATE_AUTHTOK flag is set and the real cha...
Definition: sss_cli.h:218
sss_cli_command
sss_cli_command
The allowed commands an SSS client can send to the SSSD.
Definition: sss_cli.h:67
SSS_AUTHTOK_TYPE_SC_KEYPAD
@ SSS_AUTHTOK_TYPE_SC_KEYPAD
Authentication token indicates Smart Card authentication is used and that the PIN will be entered at ...
Definition: sss_cli.h:339
SSS_PAM_CERT_INFO
@ SSS_PAM_CERT_INFO
A message indicating that Smartcard/certificate based authentication is available and contains detail...
Definition: sss_cli.h:460
SSS_OTP
@ SSS_OTP
Indicates that the authtok was a OTP, so don't cache it.
Definition: sss_cli.h:467
SSS_ENV_ITEM
@ SSS_ENV_ITEM
Set and environment variable with putenv(3).
Definition: sss_cli.h:439
SSS_PASSWORD_PROMPTING
@ SSS_PASSWORD_PROMPTING
Indicates that password prompting is possible.
Definition: sss_cli.h:470
SSS_PAM_USER_INFO_ACCOUNT_EXPIRED
@ SSS_PAM_USER_INFO_ACCOUNT_EXPIRED
Tell the user that the account has expired and optionally give a reason.
Definition: sss_cli.h:561
SSS_NSS_GETNAMEBYSID
@ SSS_NSS_GETNAMEBYSID
Takes the zero terminated string representation of a SID and returns the zero terminated fully qualif...
Definition: sss_cli.h:247
response_type
response_type
Types of different messages.
Definition: sss_cli.h:429
SSS_PAM_USER_INFO_OFFLINE_CHPASS
@ SSS_PAM_USER_INFO_OFFLINE_CHPASS
Definition: sss_cli.h:536
SSS_PAM_DOMAIN_NAME
@ SSS_PAM_DOMAIN_NAME
Name of the domain the user belongs too.
Definition: sss_cli.h:432
SSS_AUTHTOK_TYPE_CCFILE
@ SSS_AUTHTOK_TYPE_CCFILE
Authentication token is a path to a Kerberos credential cache file, it may or may no contain a traili...
Definition: sss_cli.h:329
SSS_PAM_USER_INFO
@ SSS_PAM_USER_INFO
A message which should be displayed to the user.
Definition: sss_cli.h:447
SSS_PAM_ACCT_MGMT
@ SSS_PAM_ACCT_MGMT
see pam_sm_acct_mgmt(3) for details
Definition: sss_cli.h:212
SSS_CERT_AUTH_PROMPTING
@ SSS_CERT_AUTH_PROMPTING
Indicates that on the server side Smartcard/certificate based authentication is available for the sel...
Definition: sss_cli.h:475
SSS_AUTHTOK_TYPE_2FA_SINGLE
@ SSS_AUTHTOK_TYPE_2FA_SINGLE
Authentication token has two factors in a single string, it may or may no contain a trailing \0.
Definition: sss_cli.h:343
SSS_NSS_GETNAMEBYCERT
@ SSS_NSS_GETNAMEBYCERT
Takes the zero terminated string of the base64 encoded DER representation of a X509 certificate and r...
Definition: sss_cli.h:265
SSS_AUTHTOK_TYPE_2FA
@ SSS_AUTHTOK_TYPE_2FA
Authentication token has two factors, they may or may no contain a trailing \0.
Definition: sss_cli.h:333
SSS_PAM_USER_INFO_CHPASS_ERROR
@ SSS_PAM_USER_INFO_CHPASS_ERROR
Tell the user that a password change failed and optionally give a reason.
Definition: sss_cli.h:543
SSS_PAM_CLOSE_SESSION
@ SSS_PAM_CLOSE_SESSION
see pam_sm_close_session(3) for details
Definition: sss_cli.h:216
SSS_PAM_USER_INFO_EXPIRE_WARN
@ SSS_PAM_USER_INFO_EXPIRE_WARN
Warn the user that the password will expire soon.
Definition: sss_cli.h:556
SSS_AUTHTOK_TYPE_EMPTY
@ SSS_AUTHTOK_TYPE_EMPTY
No authentication token available.
Definition: sss_cli.h:324
SSS_AUTHTOK_TYPE_PASSWORD
@ SSS_AUTHTOK_TYPE_PASSWORD
Authentication token is a password, it may or may no contain a trailing \0.
Definition: sss_cli.h:326
SSS_PAM_SYSTEM_INFO
@ SSS_PAM_SYSTEM_INFO
Message for the system log.
Definition: sss_cli.h:430
SSS_NSS_GETLISTBYCERT
@ SSS_NSS_GETLISTBYCERT
Takes the zero terminated string of the base64 encoded DER representation of a X509 certificate and r...
Definition: sss_cli.h:270
user_info_type
user_info_type
Different types of user messages.
Definition: sss_cli.h:515
SSS_PAM_CERT_INFO_WITH_HINT
@ SSS_PAM_CERT_INFO_WITH_HINT
Same as SSS_PAM_CERT_INFO but user name might be missing and should be prompted for.
Definition: sss_cli.h:481
SSS_NSS_GETORIGBYNAME
@ SSS_NSS_GETORIGBYNAME
Takes a zero terminated fully qualified name and returns a list of zero terminated strings with key-v...
Definition: sss_cli.h:258
SSS_PAM_USER_INFO_OTP_CHPASS
@ SSS_PAM_USER_INFO_OTP_CHPASS
Tell the user that he needs to kinit or login and logout to get a TGT after an OTP password change.
Definition: sss_cli.h:540
SSS_PAM_TEXT_MSG
@ SSS_PAM_TEXT_MSG
A plain text message which should be displayed to the user.
Definition: sss_cli.h:450
SSS_NSS_GETIDBYSID
@ SSS_NSS_GETIDBYSID
Takes the zero terminated string representation of a SID and returns and returns the POSIX ID of the ...
Definition: sss_cli.h:251
SSS_NSS_GETSIDBYUID
@ SSS_NSS_GETSIDBYUID
Takes an unsigned 32bit integer (POSIX UID) and reurn the zero terminated string representation of th...
Definition: sss_cli.h:275