/sssd/src/responder/common/cache_req/ |
H A D | cache_req_data.c | 62 if (input->cert == NULL) { 68 data->cert = talloc_strdup(data, input->cert); 69 if (data->cert == NULL) { 151 const char *cert) 155 input.cert = cert; 149 cache_req_data_cert(TALLOC_CTX *mem_ctx, enum cache_req_type type, const char *cert) argument
|
H A D | cache_req_private.h | 68 const char *cert; member in struct:cache_req_data
|
/sssd/src/providers/ipa/ |
H A D | ipa_subdomains.h | 127 const char *cert; member in union:req_input::__anon9
|
/sssd/src/sss_client/idmap/ |
H A D | sss_nss_idmap.c | 374 int sss_nss_getnamebycert(const char *cert, char **fq_name, argument 381 if (fq_name == NULL || cert == NULL || *cert == '\0') { 385 inp.str = cert;
|
/sssd/src/util/cert/libcrypto/ |
H A D | cert.c | 184 X509 *cert = NULL; local 199 cert = d2i_X509(NULL, &d, (int) der_size); 200 if (cert == NULL) { 207 cert_pub_key = X509_get_pubkey(cert); 275 X509_free(cert);
|
/sssd/src/p11_child/ |
H A D | p11_child_nss.c | 37 #include <cert.h> 46 #include "util/cert.h" 75 char **cert, char **token_name_out) 236 if (cert_list_node->cert) { 237 DEBUG(SSSDBG_TRACE_ALL, "found cert[%s][%s]\n", 238 cert_list_node->cert->nickname, 239 cert_list_node->cert->subjectName); 241 DEBUG(SSSDBG_TRACE_ALL, "--- empty cert list node ---\n"); 302 if (cert_list_node->cert) { 303 DEBUG(SSSDBG_TRACE_ALL, "found cert[ 72 do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const char *slot_name_in, enum op_mode mode, const char *pin, struct cert_verify_opts *cert_verify_opts, char **cert, char **token_name_out) argument 499 char *cert; local [all...] |
/sssd/src/python/ |
H A D | pysss_nss_idmap.c | 173 const char *cert; local 177 cert = py_string_or_unicode_as_string(py_cert); 178 if (cert == NULL) { 182 ret = sss_nss_getnamebycert(cert, &name, &id_type);
|
/sssd/src/responder/pam/ |
H A D | pamsrv_p11.c | 142 char *cert = NULL; local 190 DEBUG(SSSDBG_OP_FAILURE, "Missing cert in p11_child response.\n"); 195 cert = talloc_strndup(tmp_ctx, (char *) p, (pn - p)); 196 if(cert == NULL) { 201 DEBUG(SSSDBG_TRACE_ALL, "Found cert [%s].\n", cert); 208 *_cert = talloc_steal(mem_ctx, cert); 223 char *cert; member in struct:pam_check_cert_state 297 state->cert = NULL; 461 ret = parse_p11_child_response(state, buf, buf_len, &state->cert, 488 pam_check_cert_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, char **cert, char **token_name) argument [all...] |
H A D | pamsrv_cmd.c | 1369 char *cert; local 1373 ret = pam_check_cert_recv(req, preq, &cert, &preq->token_name); 1382 if (cert == NULL) { 1406 pctx->rctx->ncache, 0, NULL, cert);
|
/sssd/src/tests/cmocka/ |
H A D | test_negcache.c | 274 const char *cert = NULL; local 277 cert = CERT; 280 /*test when cert in not present in database */ 281 ret = sss_ncache_check_cert(ts->ctx, cert); 284 /* test when cert is present in database */ 286 ret = sss_ncache_set_cert(ts->ctx, permanent, cert); 289 ret = sss_ncache_check_cert(ts->ctx, cert); 293 ret = sss_ncache_set_cert(ts->ctx, permanent, cert); 296 ret = sss_ncache_check_cert(ts->ctx, cert);
|
H A D | test_nss_srv.c | 197 int __real_sss_ncache_check_cert(struct sss_nc_ctx *ctx, const char *cert); 199 int __wrap_sss_ncache_check_cert(struct sss_nc_ctx *ctx, const char *cert) argument 203 ret = __real_sss_ncache_check_cert(ctx, cert); 3359 .pw_gecos = discard_const("test cert user"),
|
/sssd/src/util/cert/nss/ |
H A D | cert.c | 24 #include <cert.h> 33 #include "util/cert.h" 46 CERTCertificate *cert = NULL; local 68 cert = CERT_NewTempCertificate(handle, &der_item, NULL, PR_FALSE, PR_TRUE); 69 if (cert == NULL) { 74 ascii_crlf = BTOA_DataToAscii(cert->derCert.data, cert->derCert.len); 119 CERT_DestroyCertificate(cert); 134 CERTCertificate *cert = NULL; local 194 cert 231 CERTCertificate *cert = NULL; local [all...] |
/sssd/src/db/ |
H A D | sysdb_views.c | 23 #include "util/cert.h" 839 const char *cert, 865 ret = sss_cert_derb64_to_ldap_filter(tmp_ctx, cert, SYSDB_USER_CERT, 882 DEBUG(SSSDBG_TRACE_FUNC, "No user override found for cert [%s].\n", 883 cert); 888 "Found more than one override for cert [%s].\n", cert); 837 sysdb_search_override_by_cert(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *cert, const char **attrs, struct ldb_result **override_obj, struct ldb_result **orig_obj) argument
|
H A D | sysdb_search.c | 2168 const char *cert, 2184 ret = sysdb_search_override_by_cert(tmp_ctx, domain, cert, attrs, 2196 ret = sysdb_search_user_by_cert(tmp_ctx, domain, cert, &orig_obj); 2166 sysdb_search_user_by_cert_with_views(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *cert, struct ldb_result **res) argument
|
H A D | sysdb_ops.c | 27 #include "util/cert.h" 4565 const char *cert, 4572 ret = sss_cert_derb64_to_ldap_filter(mem_ctx, cert, SYSDB_USER_CERT, 4589 const char *cert, 4594 return sysdb_search_object_by_cert(mem_ctx, domain, cert, user_attrs, res); 4598 const char *cert) 4607 ret = sysdb_search_object_by_cert(NULL, domain, cert, attrs, &res); 4612 DEBUG(SSSDBG_MINOR_FAILURE, "Unable to lookup object by cert " 4563 sysdb_search_object_by_cert(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *cert, const char **attrs, struct ldb_result **res) argument 4587 sysdb_search_user_by_cert(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *cert, struct ldb_result **res) argument 4597 sysdb_remove_cert(struct sss_domain_info *domain, const char *cert) argument
|
/sssd/src/responder/common/ |
H A D | negcache.c | 443 int sss_ncache_check_cert(struct sss_nc_ctx *ctx, const char *cert) argument 448 str = talloc_asprintf(ctx, "%s/%s", NC_CERT_PREFIX, cert); 618 const char *cert) 623 str = talloc_asprintf(ctx, "%s/%s", NC_CERT_PREFIX, cert); 617 sss_ncache_set_cert(struct sss_nc_ctx *ctx, bool permanent, const char *cert) argument
|
/sssd/src/tools/ |
H A D | sss_override.c | 44 const char *cert; member in struct:override_user 105 {"certificate", 'x', POPT_ARG_STRING, &user->cert, 0, _("Override certificate"), NULL }, 307 const char *cert) 366 if (cert != NULL) { 367 ret = sysdb_attrs_add_base64_blob(attrs, SYSDB_USER_CERT, cert); 388 user->home, user->shell, user->gecos, user->cert); 1180 objs[i].cert = sss_base64_encode(objs, el->values[0].data, 1182 if (objs[i].cert == NULL) { 1188 objs[i].cert = NULL; 1322 {SSS_COLONDB_STRING, {.str = objs[i].cert}}, 299 build_attrs(TALLOC_CTX *mem_ctx, struct sss_domain_info *dom, const char *name, uid_t uid, gid_t gid, const char *home, const char *shell, const char *gecos, const char *cert) argument [all...] |