Lines Matching refs:buf
452 uint8_t *buf)
467 memcpy(&expire_date, buf + sizeof(uint32_t), sizeof(int64_t));
501 uint8_t *buf)
511 memcpy(&grace, buf + sizeof(uint32_t), sizeof(uint32_t));
535 uint8_t *buf)
546 memcpy(&expire, buf + sizeof(uint32_t), sizeof(uint32_t));
575 uint8_t *buf)
590 memcpy(&delayed_until, buf + sizeof(uint32_t), sizeof(int64_t));
656 uint8_t *buf)
663 /* resp_type and length of message are expected to be in buf */
670 memcpy(&msg_len, buf + sizeof(uint32_t), sizeof(uint32_t));
693 msg_len > 0 ? (char *)(buf + 2 * sizeof(uint32_t)) : "" );
713 uint8_t *buf)
725 memcpy(&msg_len, buf + sizeof(uint32_t), sizeof(uint32_t));
748 msg_len > 0 ? (char *)(buf + 2 * sizeof(uint32_t)) : "" );
768 uint8_t *buf)
778 memcpy(&type, buf, sizeof(uint32_t));
782 ret = user_info_offline_auth(pamh, buflen, buf);
785 ret = user_info_grace_login(pamh, buflen, buf);
788 ret = user_info_expire_warn(pamh, buflen, buf);
791 ret = user_info_offline_auth_delayed(pamh, buflen, buf);
800 ret = user_info_chpass_error(pamh, buflen, buf);
803 ret = user_info_account_expired(pamh, buflen, buf);
813 static int eval_response(pam_handle_t *pamh, size_t buflen, uint8_t *buf,
830 memcpy(&pam_status, buf+p, sizeof(int32_t));
834 memcpy(&c, buf+p, sizeof(int32_t));
843 memcpy(&type, buf+p, sizeof(int32_t));
846 memcpy(&len, buf+p, sizeof(int32_t));
856 if (buf[p + (len -1)] != '\0') {
860 logger(pamh, LOG_INFO, "system info: [%s]", &buf[p]);
863 if (buf[p + (len -1)] != '\0') {
867 D(("domain name: [%s]", &buf[p]));
868 pi->domain_name = strdup((char *) &buf[p]);
876 if (buf[p + (len -1)] != '\0') {
881 D(("env item: [%s]", &buf[p]));
883 ret = pam_putenv(pamh, (char *)&buf[p]);
891 env_item = strdup((char *)&buf[p]);
904 ret = eval_user_info_response(pamh, len, &buf[p]);
910 if (buf[p + (len -1)] != '\0') {
915 ret = do_pam_conversation(pamh, PAM_TEXT_INFO, (char *) &buf[p],
931 if (buf[p + (len - 1)] != '\0') {
936 pi->otp_vendor = strdup((char *) &buf[p]);
949 pi->otp_token_id = strdup((char *) &buf[p + offset]);
962 pi->otp_challenge = strdup((char *) &buf[p + offset]);
970 if (buf[p + (len - 1)] != '\0') {
975 pi->cert_user = strdup((char *) &buf[p]);
1009 pi->token_name = strdup((char *) &buf[p + offset]);
1143 uint8_t *buf = NULL;
1150 ret = pack_message_v3(pi, &rd.len, &buf);
1156 rd.data = buf;
1253 if (buf != NULL ) {
1254 _pam_overwrite_n((void *)buf, rd.len);
1255 free(buf);