Searched defs:len (Results 1 - 25 of 94) sorted by relevance

1234

/sssd-io/src/util/
H A Dutil_lock.c31 errno_t sss_br_lock_file(int fd, size_t start, size_t len, argument
45 lock.l_len = len;
H A Dsss_tc_utf8.c42 sss_tc_utf8_tolower(TALLOC_CTX *mem_ctx, const uint8_t *s, size_t len, size_t *_nlen) argument
48 lower = sss_utf8_tolower(s, len, &nlen);
H A Dmurmurhash3.c52 uint32_t murmurhash3(const char *key, int len, uint32_t seed) argument
64 nblocks = len / 4;
90 switch (len & 3) {
110 h1 ^= len;
H A Dsss_ssh.c155 size_t i, len; local
193 len = pubkey->data_len;
194 if (pubkey->data[len - 1] == '\n') {
195 len--;
198 out = talloc_array(mem_ctx, char, len + 1);
204 memcpy(out, pubkey->data, len);
205 out[len] = '\0';
H A Dsss_utf8.c53 uint8_t *sss_utf8_tolower(const uint8_t *s, size_t len, size_t *_nlen) argument
58 lower = u8_tolower(s, len, NULL, NULL, NULL, &llen);
65 uint8_t *sss_utf8_tolower(const uint8_t *s, size_t len, size_t *_nlen) argument
71 glower = g_utf8_strdown((const gchar *) s, len);
/sssd-io/src/lib/certmap/
H A Dsss_certmap_attr_names.c81 size_t len; local
92 len = p - rdn;
93 if (len == 0) {
102 if (strlen(oid_attr_name_map[c].nss) != len
103 || strncmp(rdn, oid_attr_name_map[c].nss, len) != 0) {
H A Dsss_cert_content_common.c54 enum san_opt san_opt, const uint8_t *data, size_t len,
59 if (data == NULL || len == 0 || san_opt == SAN_INVALID) {
70 i->bin_val = talloc_memdup(i, data, len);
71 i->bin_val_len = len;
73 i->val = talloc_strndup(i, (const char *) data, len);
53 add_to_san_list(TALLOC_CTX *mem_ctx, bool is_bin, enum san_opt san_opt, const uint8_t *data, size_t len, struct san_list **item) argument
/sssd-io/src/lib/sifp/
H A Dsss_sifp_utils.c79 size_t len = strlen(str1) + strlen(str2) + 1; local
81 result = _alloc_zero(ctx, char, len);
/sssd-io/src/sss_client/
H A Dpam_message.c106 int len; local
110 len = sizeof(uint32_t) + sizeof(uint32_t);
112 len += *pi->pam_user != '\0' ?
114 len += *pi->pam_service != '\0' ?
116 len += *pi->pam_tty != '\0' ?
118 len += *pi->pam_ruser != '\0' ?
120 len += *pi->pam_rhost != '\0' ?
122 len += pi->pam_authtok != NULL ?
124 len += pi->pam_newauthtok != NULL ?
126 len
[all...]
H A Dnss_mc_group.c159 || data->strs_len > rec->len
160 || (uint8_t *) rec + rec->len > gr_mc_ctx.data_table + data_size) {
194 int len; local
202 len = snprintf(gidstr, 11, "%ld", (long)gid);
203 if (len > 10) {
209 hash = sss_nss_mc_hash(&gr_mc_ctx, gidstr, len+1);
H A Dnss_mc_passwd.c152 || data->strs_len > rec->len
153 || (uint8_t *) rec + rec->len > pw_mc_ctx.data_table + data_size) {
187 int len; local
195 len = snprintf(uidstr, 11, "%ld", (long)uid);
196 if (len > 10) {
202 hash = sss_nss_mc_hash(&pw_mc_ctx, uidstr, len+1);
H A Dnss_mc_common.c43 #define MEMCPY_WITH_BARRIERS(res, dest, src, len) \
50 memcpy(dest, src, len); \
252 const char *key, size_t len)
254 return murmurhash3(key, len, ctx->seed) % MC_HT_ELEMS(ctx->ht_size);
277 rec_len = rec->len;
337 char *buf, size_t len)
339 char *max = buf + len;
251 sss_nss_mc_hash(struct sss_cli_mc_ctx *ctx, const char *key, size_t len) argument
336 sss_nss_str_ptr_from_buffer(char **str, void **cookie, char *buf, size_t len) argument
H A Dnss_netgroup.c63 uint8_t *buf, size_t *len)
71 if (*len < 6) {
77 slen = *len - sizeof(uint32_t);
153 *len = slen -i;
192 rd.len = name_len + 1;
268 rd.len = sizeof(uint32_t);
62 sss_nss_getnetgr_readrep(struct sss_nss_netgr_rep *pr, uint8_t *buf, size_t *len) argument
H A Dnss_passwd.c34 size_t len; member in struct:sss_nss_getpwent_data
45 sss_nss_getpwent_data.len = 0;
68 uint8_t *buf, size_t *len)
75 if (*len < 13) { /* not enough space for data, bad packet */
85 slen = *len - 8;
125 *len = slen - i;
136 size_t replen, len, name_len; local
171 rd.len = name_len + 1;
225 len = replen - 8;
226 ret = sss_nss_getpw_readrep(&pwrep, repbuf+8, &len);
67 sss_nss_getpw_readrep(struct sss_nss_pw_rep *pr, uint8_t *buf, size_t *len) argument
247 size_t replen, len; local
[all...]
/sssd-io/src/tests/cmocka/
H A Ddummy_child.c39 ssize_t len; local
112 len = sss_atomic_read_s(STDIN_FILENO, buf, IN_BUF_SIZE);
113 if (len == -1) {
121 written = sss_atomic_write_s(3, buf, len);
130 if (written != len) {
132 len, written);
H A Dtest_expire_common.c41 size_t len; local
47 len = strftime(timestr, MAX, format, tm);
48 if (len == 0) {
/sssd-io/src/providers/
H A Ddp_pam_data_util.c182 int len, const uint8_t *data)
190 new->len = len;
191 new->data = talloc_memdup(pd, data, len);
181 pam_add_response(struct pam_data *pd, enum response_type type, int len, const uint8_t *data) argument
H A Ddp_auth_util.c206 DBUS_TYPE_BYTE, &(resp->data), resp->len);
238 int len; local
313 dbus_message_iter_get_fixed_array(&sub_iter, &data, &len);
315 if (pam_add_response(pd, type, len, data) != EOK) {
/sssd-io/src/providers/krb5/
H A Dkrb5_access.c176 ssize_t len = -1; local
179 ret = handle_child_recv(subreq, state, &buf, &len);
187 if ((size_t) len != sizeof(int32_t)) {
H A Dkrb5_delayed_online_authentication.c278 size_t len; local
280 ret = sss_authtok_get_password(new_pd->authtok, &password, &len);
289 new_pd->key_serial = add_key("user", new_pd->user, password, len,
/sssd-io/src/sss_client/libwbclient/
H A Dwbc_sid_common.c75 int len; local
81 len = wbcSidToStringBuf(sid, buf, sizeof(buf));
83 if (len+1 > sizeof(buf)) {
87 result = (char *)wbcAllocateMemory(len+1, 1, NULL);
91 memcpy(result, buf, len+1);
H A Dwbclient_common.c134 size_t len; local
136 len = strlen(str);
137 result = (char *)wbcAllocateMemory(len+1, sizeof(char), NULL);
141 memcpy(result, str, len+1);
/sssd-io/src/sss_client/sudo/
H A Dsss_sudo_response.c226 size_t len = 0; local
241 len = strnlen(current, maxlen);
242 if (len == maxlen) {
247 str = strndup(current, len);
253 *_cursor = start_pos + len + 1;
/sssd-io/src/util/cert/
H A Dcert_common.c169 size_t len; local
178 len = (blob_size * 3) + 1;
179 str = talloc_size(mem_ctx, len);
184 str[len - 1] = '\0';
/sssd-io/src/providers/ipa/
H A Dselinux_child.c46 uint32_t len; local
49 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p);
50 DEBUG(SSSDBG_TRACE_INTERNAL, "seuser length: %d\n", len);
51 if (len == 0) {
56 if (len > size - p) return EINVAL;
57 ibuf->seuser = talloc_strndup(ibuf, (char *)(buf + p), len);
60 p += len;
64 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p);
65 DEBUG(SSSDBG_TRACE_INTERNAL, "mls_range length: %d\n", len);
66 if (len
203 ssize_t len = 0; local
[all...]

Completed in 36 milliseconds

1234