Lines Matching refs:state

54     struct get_password_migration_flag_state *state;
61 req = tevent_req_create(memctx, &state,
68 state->ev = ev;
69 state->sdap_id_ctx = sdap_id_ctx;
70 state->srv = NULL;
71 state->password_migration = false;
72 state->ipa_realm = ipa_realm;
74 state->sdap_op = sdap_id_op_create(state,
75 state->sdap_id_ctx->conn->conn_cache);
76 if (state->sdap_op == NULL) {
81 subreq = sdap_id_op_connect_send(state->sdap_op, state, &ret);
101 struct get_password_migration_flag_state *state = tevent_req_data(req,
122 subreq = ipa_get_config_send(state, state->ev,
123 sdap_id_op_handle(state->sdap_op),
124 state->sdap_id_ctx->opts, state->ipa_realm, NULL);
133 struct get_password_migration_flag_state *state = tevent_req_data(req,
139 ret = ipa_get_config_recv(subreq, state, &reply);
147 state->password_migration = true;
161 struct get_password_migration_flag_state *state = tevent_req_data(req,
166 *password_migration = state->password_migration;
190 struct ipa_pam_auth_handler_state *state;
194 req = tevent_req_create(mem_ctx, &state,
201 state->pd = pd;
202 state->ev = params->ev;
203 state->auth_ctx = auth_ctx;
204 state->be_ctx = params->be_ctx;
205 state->dom = find_domain_by_name(state->be_ctx->domain,
206 state->pd->domain,
208 if (state->dom == NULL) {
209 DEBUG(SSSDBG_CRIT_FAILURE, "Unknown domain %s\n", state->pd->domain);
216 subreq = krb5_auth_queue_send(state, params->ev, params->be_ctx,
237 struct ipa_pam_auth_handler_state *state;
244 state = tevent_req_data(req, struct ipa_pam_auth_handler_state);
246 state->pd->pam_status = PAM_SYSTEM_ERR;
247 ret = krb5_auth_queue_recv(subreq, &state->pd->pam_status, &dp_err);
249 if (ret != EOK && state->pd->pam_status != PAM_CRED_ERR) {
259 if (state->pd->cmd == SSS_PAM_AUTHENTICATE
260 && state->pd->pam_status == PAM_CRED_ERR
261 && !IS_SUBDOMAIN(state->dom)) {
262 realm = dp_opt_get_string(state->auth_ctx->ipa_options, IPA_KRB5_REALM);
263 subreq = get_password_migration_flag_send(state, state->ev,
264 state->auth_ctx->sdap_id_ctx,
281 struct ipa_pam_auth_handler_state *state;
288 state = tevent_req_data(req, struct ipa_pam_auth_handler_state);
295 state->pd->pam_status = PAM_SYSTEM_ERR;
300 sdap_auth_ctx = state->auth_ctx->sdap_auth_ctx;
301 subreq = sdap_cli_connect_send(state, state->ev,
307 state->pd->pam_status = PAM_SYSTEM_ERR;
322 struct ipa_pam_auth_handler_state *state;
332 state = tevent_req_data(req, struct ipa_pam_auth_handler_state);
334 state->pd->pam_status = PAM_SYSTEM_ERR;
336 ret = sdap_cli_connect_recv(subreq, state, NULL, &sh, NULL);
347 ret = sysdb_search_user_by_name(state, state->be_ctx->domain,
348 state->pd->user, attrs, &msg);
357 state->pd->user);
361 timeout = dp_opt_get_int(state->auth_ctx->sdap_auth_ctx->opts->basic,
364 subreq = sdap_auth_send(state, state->ev, sh, NULL, NULL, dn,
365 state->pd->authtok, timeout);
380 struct ipa_pam_auth_handler_state *state;
385 state = tevent_req_data(req, struct ipa_pam_auth_handler_state);
387 ret = sdap_auth_recv(subreq, state, NULL);
399 state->pd->pam_status = PAM_CRED_INSUFFICIENT;
403 state->pd->pam_status = PAM_SYSTEM_ERR;
410 subreq = krb5_auth_queue_send(state, state->ev, state->be_ctx, state->pd,
411 state->auth_ctx->krb5_auth_ctx);
426 struct ipa_pam_auth_handler_state *state;
432 state = tevent_req_data(req, struct ipa_pam_auth_handler_state);
434 ret = krb5_auth_queue_recv(subreq, &state->pd->pam_status, &dp_err);
438 state->pd->pam_status = PAM_SYSTEM_ERR;
450 struct ipa_pam_auth_handler_state *state = NULL;
452 state = tevent_req_data(req, struct ipa_pam_auth_handler_state);
456 *_data = talloc_steal(mem_ctx, state->pd);