Lines Matching refs:body
127 size_t data_size, uint8_t *body, size_t blen,
138 SAFEALIGN_COPY_UINT32_CHECK(&auth_token_type, &body[*c], blen, c);
140 auth_token_data = body+(*c);
174 static int extract_string(char **var, size_t size, uint8_t *body, size_t blen,
180 str = body+(*c);
196 static int extract_uint32_t(uint32_t *var, size_t size, uint8_t *body,
202 SAFEALIGN_COPY_UINT32_CHECK(var, &body[*c], blen, c);
228 uint8_t *body, size_t blen)
243 SAFEALIGN_COPY_UINT32(&start, body, NULL);
244 SAFEALIGN_COPY_UINT32(&terminator, body + blen - sizeof(uint32_t), NULL);
254 SAFEALIGN_COPY_UINT32_CHECK(&type, &body[c], blen, &c);
259 SAFEALIGN_COPY_UINT32_CHECK(&size, &body[c], blen, &c);
269 ret = extract_string(&pd->logon_name, size, body, blen, &c);
273 ret = extract_string(&pd->service, size, body, blen, &c);
277 ret = extract_string(&pd->tty, size, body, blen, &c);
281 ret = extract_string(&pd->ruser, size, body, blen, &c);
285 ret = extract_string(&pd->rhost, size, body, blen, &c);
289 ret = extract_string(&requested_domains, size, body, blen,
304 body, blen, &c);
309 size, body, blen, &c);
314 size, body, blen, &c);
331 uint8_t *body, size_t blen)
335 ret = pam_parse_in_data_v2(pd, body, blen);
350 uint8_t *body, size_t blen, size_t *c)
357 SAFEALIGN_COPY_UINT32_CHECK(&auth_token_type, &body[*c], blen, c);
358 SAFEALIGN_COPY_UINT32_CHECK(&auth_token_length, &body[*c], blen, c);
359 auth_token_data = body+(*c);
379 uint8_t *body, size_t blen)
390 for (start = end; end < last; end++) if (body[end] == '\0') break;
391 if (body[end++] != '\0') return EINVAL;
392 pd->logon_name = (char *) &body[start];
394 for (start = end; end < last; end++) if (body[end] == '\0') break;
395 if (body[end++] != '\0') return EINVAL;
396 pd->service = (char *) &body[start];
398 for (start = end; end < last; end++) if (body[end] == '\0') break;
399 if (body[end++] != '\0') return EINVAL;
400 pd->tty = (char *) &body[start];
402 for (start = end; end < last; end++) if (body[end] == '\0') break;
403 if (body[end++] != '\0') return EINVAL;
404 pd->ruser = (char *) &body[start];
406 for (start = end; end < last; end++) if (body[end] == '\0') break;
407 if (body[end++] != '\0') return EINVAL;
408 pd->rhost = (char *) &body[start];
410 ret = extract_authtok_v1(pd->authtok, body, blen, &end);
415 ret = extract_authtok_v1(pd->newauthtok, body, blen, &end);
686 uint8_t *body;
915 sss_packet_get_body(prctx->creq->out, &body, &blen);
919 memcpy(&body[p], &pd->pam_status, sizeof(int32_t));
922 memcpy(&body[p], &resp_c, sizeof(int32_t));
928 memcpy(&body[p], &resp->type, sizeof(int32_t));
930 memcpy(&body[p], &resp->len, sizeof(int32_t));
932 memcpy(&body[p], resp->data, resp->len);
1064 uint8_t *body;
1071 sss_packet_get_body(prctx->creq->in, &body, &blen);
1074 body + blen - sizeof(uint32_t),
1085 ret = pam_parse_in_data(pd, body, blen);
1088 ret = pam_parse_in_data_v2(pd, body, blen);
1091 ret = pam_parse_in_data_v3(pd, body, blen);