/sssd/src/util/ |
H A D | util_lock.c | 31 errno_t sss_br_lock_file(int fd, size_t start, size_t len, argument 45 lock.l_len = len;
|
H A D | sss_tc_utf8.c | 42 sss_tc_utf8_tolower(TALLOC_CTX *mem_ctx, const uint8_t *s, size_t len, size_t *_nlen) argument 48 lower = sss_utf8_tolower(s, len, &nlen);
|
H A D | murmurhash3.c | 52 uint32_t murmurhash3(const char *key, int len, uint32_t seed) argument 64 nblocks = len / 4; 90 switch (len & 3) { 107 h1 ^= len;
|
H A D | sss_ssh.c | 155 size_t i, len; local 193 len = pubkey->data_len; 194 if (pubkey->data[len - 1] == '\n') { 195 len--; 198 out = talloc_array(mem_ctx, char, len + 1); 204 memcpy(out, pubkey->data, len); 205 out[len] = '\0';
|
H A D | sss_utf8.c | 53 uint8_t *sss_utf8_tolower(const uint8_t *s, size_t len, size_t *_nlen) argument 58 lower = u8_tolower(s, len, NULL, NULL, NULL, &llen); 65 uint8_t *sss_utf8_tolower(const uint8_t *s, size_t len, size_t *_nlen) argument 71 glower = g_utf8_strdown((const gchar *) s, len);
|
/sssd/src/lib/sifp/ |
H A D | sss_sifp_utils.c | 79 size_t len = strlen(str1) + strlen(str2) + 1; local 81 result = _alloc_zero(ctx, char, len);
|
/sssd/src/sss_client/ |
H A D | pam_message.c | 106 int len; local 110 len = sizeof(uint32_t) + sizeof(uint32_t); 112 len += *pi->pam_user != '\0' ? 114 len += *pi->pam_service != '\0' ? 116 len += *pi->pam_tty != '\0' ? 118 len += *pi->pam_ruser != '\0' ? 120 len += *pi->pam_rhost != '\0' ? 122 len += pi->pam_authtok != NULL ? 124 len += pi->pam_newauthtok != NULL ? 126 len [all...] |
H A D | nss_mc_group.c | 158 || data->strs_len > rec->len 159 || rec->len > data_size) { 194 int len; local 202 len = snprintf(gidstr, 11, "%ld", (long)gid); 203 if (len > 10) { 209 hash = sss_nss_mc_hash(&gr_mc_ctx, gidstr, len+1);
|
H A D | nss_mc_passwd.c | 151 || data->strs_len > rec->len 152 || rec->len > data_size) { 187 int len; local 195 len = snprintf(uidstr, 11, "%ld", (long)uid); 196 if (len > 10) { 202 hash = sss_nss_mc_hash(&pw_mc_ctx, uidstr, len+1);
|
H A D | nss_mc_common.c | 43 #define MEMCPY_WITH_BARRIERS(res, dest, src, len) \ 50 memcpy(dest, src, len); \ 252 const char *key, size_t len) 254 return murmurhash3(key, len, ctx->seed) % MC_HT_ELEMS(ctx->ht_size); 277 rec_len = rec->len; 337 char *buf, size_t len) 339 char *max = buf + len; 251 sss_nss_mc_hash(struct sss_cli_mc_ctx *ctx, const char *key, size_t len) argument 336 sss_nss_str_ptr_from_buffer(char **str, void **cookie, char *buf, size_t len) argument
|
H A D | nss_passwd.c | 33 size_t len; member in struct:sss_nss_getpwent_data 44 sss_nss_getpwent_data.len = 0; 73 uint8_t *buf, size_t *len) 80 if (*len < 13) { /* not enough space for data, bad packet */ 90 slen = *len - 8; 130 *len = slen - i; 141 size_t replen, len, name_len; local 176 rd.len = name_len + 1; 230 len = replen - 8; 231 ret = sss_nss_getpw_readrep(&pwrep, repbuf+8, &len); 72 sss_nss_getpw_readrep(struct sss_nss_pw_rep *pr, uint8_t *buf, size_t *len) argument 252 size_t replen, len; local [all...] |
H A D | nss_netgroup.c | 63 uint8_t *buf, size_t *len) 71 if (*len < 6) { 77 slen = *len - sizeof(uint32_t); 153 *len = slen -i; 192 rd.len = name_len + 1; 265 rd.len = sizeof(uint32_t); 62 sss_nss_getnetgr_readrep(struct sss_nss_netgr_rep *pr, uint8_t *buf, size_t *len) argument
|
/sssd/src/tests/cmocka/ |
H A D | dummy_child.c | 38 ssize_t len; local 108 len = sss_atomic_read_s(STDIN_FILENO, buf, IN_BUF_SIZE); 109 if (len == -1) { 117 written = sss_atomic_write_s(3, buf, len); 126 if (written != len) { 128 len, written);
|
H A D | test_expire_common.c | 41 size_t len; local 47 len = strftime(timestr, MAX, format, tm); 48 if (len == 0) {
|
H A D | test_sbus_opath.c | 157 size_t len; local 160 ret = sbus_opath_decompose(NULL, path, NULL, &components, &len); 162 check_opath_components_and_length(components, len, expected, expected_len); 172 size_t len; local 175 ret = sbus_opath_decompose(NULL, path, "/object/path", &components, &len); 177 check_opath_components_and_length(components, len, expected, expected_len); 187 size_t len; local 190 ret = sbus_opath_decompose(NULL, path, "/object/path/", &components, &len); 192 check_opath_components_and_length(components, len, expected, expected_len); 200 size_t len; local 213 size_t len; local [all...] |
/sssd/src/providers/ |
H A D | dp_pam_data_util.c | 182 int len, const uint8_t *data) 190 new->len = len; 191 new->data = talloc_memdup(pd, data, len); 181 pam_add_response(struct pam_data *pd, enum response_type type, int len, const uint8_t *data) argument
|
H A D | dp_auth_util.c | 206 DBUS_TYPE_BYTE, &(resp->data), resp->len); 238 int len; local 313 dbus_message_iter_get_fixed_array(&sub_iter, &data, &len); 315 if (pam_add_response(pd, type, len, data) != EOK) {
|
/sssd/src/providers/krb5/ |
H A D | krb5_access.c | 176 ssize_t len = -1; local 179 ret = handle_child_recv(subreq, state, &buf, &len); 187 if ((size_t) len != sizeof(int32_t)) {
|
H A D | krb5_delayed_online_authentication.c | 271 size_t len; local 273 ret = sss_authtok_get_password(new_pd->authtok, &password, &len); 282 new_pd->key_serial = add_key("user", new_pd->user, password, len,
|
/sssd/src/sss_client/libwbclient/ |
H A D | wbc_sid_common.c | 75 int len; local 81 len = wbcSidToStringBuf(sid, buf, sizeof(buf)); 83 if (len+1 > sizeof(buf)) { 87 result = (char *)wbcAllocateMemory(len+1, 1, NULL); 91 memcpy(result, buf, len+1);
|
H A D | wbclient_common.c | 134 size_t len; local 136 len = strlen(str); 137 result = (char *)wbcAllocateMemory(len+1, sizeof(char), NULL); 141 memcpy(result, str, len+1);
|
/sssd/src/sss_client/sudo/ |
H A D | sss_sudo_response.c | 226 size_t len = 0; local 241 len = strnlen(current, maxlen); 242 if (len == maxlen) { 247 str = strndup(current, len); 253 *_cursor = start_pos + len + 1;
|
/sssd/src/util/cert/ |
H A D | cert_common.c | 115 size_t len; local 124 len = (blob_size * 3) + 1; 125 str = talloc_size(mem_ctx, len); 130 str[len - 1] = '\0';
|
/sssd/src/providers/ipa/ |
H A D | selinux_child.c | 46 uint32_t len; local 49 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 50 DEBUG(SSSDBG_TRACE_INTERNAL, "seuser length: %d\n", len); 51 if (len == 0) { 56 if (len > size - p) return EINVAL; 57 ibuf->seuser = talloc_strndup(ibuf, (char *)(buf + p), len); 60 p += len; 64 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 65 DEBUG(SSSDBG_TRACE_INTERNAL, "mls_range length: %d\n", len); 66 if (len 199 ssize_t len = 0; local [all...] |
/sssd/src/sss_client/ssh/ |
H A D | sss_ssh_client.c | 120 uint32_t count, reserved, len, i; local 162 rd.len = req_len; 217 SAFEALIGN_COPY_UINT32(&len, rep+c, &c); 219 if (len > rep_len - c - sizeof(uint32_t)) { 225 res->name = talloc_array(res, char, len); 231 safealign_memcpy(res->name, rep+c, len, &c); 232 if (strnlen(res->name, len) != len-1) { 237 c += len; 240 SAFEALIGN_COPY_UINT32(&len, re [all...] |