/sssd-io/src/responder/kcm/ |
H A D | kcmsrv_pvt.h | 40 size_t length; member in struct:kcm_data
|
/sssd-io/src/sss_client/libwbclient/ |
H A D | wbc_util_common.c | 46 size_t length) 84 blob->blob.length = length; 85 blob->blob.data = (uint8_t *)malloc(length); 87 memcpy(blob->blob.data, data, length); 41 wbcAddNamedBlob(size_t *num_blobs, struct wbcNamedBlob **pblobs, const char *name, uint32_t flags, uint8_t *data, size_t length) argument
|
H A D | wbclient_sssd.h | 219 size_t length; member in struct:wbcBlob 583 * @param buflen Target buffer length 585 * @return Resulting string length. 2058 * @param[in] length Blob data length of new blob 2067 size_t length);
|
/sssd-io/src/lib/cifs_idmap_sss/ |
H A D | cifs_idmap_sss.c | 139 size_t length; local 142 sid, &bsid, &length); 147 if (length > sizeof(struct cifs_sid)) { 148 ctx_set_error(ctx, "too large sid length"); 153 memcpy(csid, bsid, length);
|
/sssd-io/src/util/ |
H A D | safe-format-string.c | 244 size_t length; member in struct:sprintf_ctx 251 size_t length) 256 if (cx->length > cx->alloc) 257 length = 0; 258 else if (cx->length + length > cx->alloc) 259 length = cx->alloc - cx->length; 261 if (length > 0) 262 memcpy (cx->data + cx->length, piec 249 snprintf_copy_fn(void *data, const char *piece, size_t length) argument [all...] |
H A D | authtok.c | 25 size_t length; member in struct:sss_auth_token 44 return tok->length; 72 *len = tok->length - 1; 97 *len = tok->length - 1; 124 /* we do not allow zero length typed tokens */ 137 tok->length = size; 154 safezero(tok->data, tok->length); 163 tok->length = 0; 222 dst->data = talloc_memdup(dst, src->data, src->length); 226 dst->length [all...] |
H A D | sss_krb5.c | 587 int length = src->length; local 590 memcpy(dest, src->data, src->length); 591 return src->length; 594 for (j=0; j < length; j++,cp++) { 636 int length = src->length; local 638 int size = length; 644 for (j = 0; j < length; j++,cp++) 686 int length; [all...] |
/sssd-io/src/lib/idmap/ |
H A D | sss_idmap_conv.c | 46 size_t length, 57 if (length > sizeof(struct sss_dom_sid)) return IDMAP_SID_INVALID; 112 size_t length; local 123 length = 2 + SID_ID_AUTHS + dom_sid->num_auths * 4; 125 bin_sid = ctx->alloc_func(length, ctx->alloc_pvt); 142 if (p + sizeof(uint32_t) > length) { 151 *_length = length; 336 size_t length; local 344 err = sss_idmap_dom_sid_to_bin_sid(ctx, dom_sid, &bin_sid, &length); 349 *_length = length; 44 sss_idmap_bin_sid_to_dom_sid(struct sss_idmap_ctx *ctx, const uint8_t *bin_sid, size_t length, struct sss_dom_sid **_dom_sid) argument 362 sss_idmap_bin_sid_to_sid(struct sss_idmap_ctx *ctx, const uint8_t *bin_sid, size_t length, char **_sid) argument 507 sss_idmap_bin_sid_to_smb_sid(struct sss_idmap_ctx *ctx, const uint8_t *bin_sid, size_t length, struct dom_sid **_smb_sid) argument 546 size_t length; local [all...] |
H A D | sss_idmap.c | 1291 size_t length, 1299 err = sss_idmap_bin_sid_to_sid(ctx, bin_sid, length, &sid); 1358 size_t length, 1366 err = sss_idmap_bin_sid_to_sid(ctx, bin_sid, length, &sid); 1440 size_t length; local 1449 err = sss_idmap_sid_to_bin_sid(ctx, sid, &bin_sid, &length); 1455 *_length = length; 1289 sss_idmap_bin_sid_to_unix(struct sss_idmap_ctx *ctx, uint8_t *bin_sid, size_t length, uint32_t *id) argument 1356 sss_idmap_check_bin_sid_unix(struct sss_idmap_ctx *ctx, uint8_t *bin_sid, size_t length, uint32_t id) argument
|
/sssd-io/src/responder/secrets/ |
H A D | secsrv_cmd.c | 178 static bool sec_too_much_data(struct sec_req_ctx *req, size_t length) argument 180 req->total_size += length; 198 const char *at, size_t length) 203 if (sec_too_much_data(req, length)) return -1; 205 sec_append_string(req, &req->request_url, at, length); 215 const char *at, size_t length) 221 if (sec_too_much_data(req, length)) return -1; 243 sec_append_string(req->headers, &req->headers[n - 1].name, at, length); 254 const char *at, size_t length) 260 if (sec_too_much_data(req, length)) retur 197 sec_on_url(http_parser *parser, const char *at, size_t length) argument 214 sec_on_header_field(http_parser *parser, const char *at, size_t length) argument 253 sec_on_header_value(http_parser *parser, const char *at, size_t length) argument 289 sec_on_body(http_parser *parser, const char *at, size_t length) argument [all...] |
H A D | secsrv_private.h | 38 size_t length; member in struct:sec_data
|
/sssd-io/src/tests/ |
H A D | sss_idmap-tests.c | 466 size_t length; local 469 &bin_sid, &length); 472 err = sss_idmap_bin_sid_to_unix(idmap_ctx, bin_sid, length , &id); 581 size_t length; local 584 err = sss_idmap_unix_to_bin_sid(idmap_ctx, 10000, &bin_sid, &length); 588 err = sss_idmap_unix_to_bin_sid(idmap_ctx, 2234, &bin_sid, &length); 591 err = sss_idmap_bin_sid_to_sid(idmap_ctx, bin_sid, length, &sid); 693 size_t length; local 696 err = sss_idmap_sid_to_bin_sid(idmap_ctx, test_sid, &bin_sid, &length); 699 fail_unless(length 751 size_t length; local [all...] |
H A D | sbus_codegen_tests.c | 1206 int length; member in struct:prop_test
|
/sssd-io/src/providers/ |
H A D | data_provider.h | 134 * length */ 253 size_t length; member in struct:dp_opt_blob
|
/sssd-io/src/providers/krb5/ |
H A D | krb5_child.c | 220 sss_data.len = pac_authdata[0]->length; 330 if (ti->length == 0) { 335 if (ti->length > 0 && ti->length != fa2_len) { 338 "do not match.\n", ti->length, fa2_len); 410 if (ti->length == 0) { 429 if (ti->length < 1) { 434 if (ti->length >= len) { 440 pin = talloc_strndup(NULL, pwd, len - ti->length); 448 memmove(token, token + len - ti->length, t 1494 have_ms_kile_ext_error(unsigned char *data, unsigned int length, uint32_t *_ntstatus) argument [all...] |
/sssd-io/src/providers/ad/ |
H A D | ad_gpo.c | 3528 size_t length, 3538 blob.length = length; 3944 ret = ad_gpo_parse_sd(gp_gpo, el[0].values[0].data, el[0].values[0].length, 3526 ad_gpo_parse_sd(TALLOC_CTX *mem_ctx, uint8_t *data, size_t length, struct security_descriptor **_gpo_sd) argument
|