Searched defs:msg_len (Results 1 - 6 of 6) sorted by relevance

/sssd/src/responder/pam/
H A Dpamsrv_p11.c521 size_t msg_len; local
532 msg_len = user_len + slot_len;
534 msg = talloc_zero_size(pd, msg_len);
550 ret = pam_add_response(pd, SSS_PAM_CERT_INFO, msg_len, msg);
H A Dpamsrv_cmd.c88 size_t msg_len; local
92 ret = pack_user_info_msg(pd, pam_message, &msg_len, &msg);
97 ret = pam_add_response(pd, SSS_PAM_USER_INFO, msg_len, msg);
/sssd/src/providers/krb5/
H A Dkrb5_child_handler.c613 int32_t msg_len; local
650 SAFEALIGN_COPY_INT32(&msg_len, buf+p, &p);
653 msg_status, msg_type, msg_len);
655 if (msg_len > len - p) {
657 msg_len, len - p);
667 (msg_len > pref_len) &&
670 ccname_len = msg_len-pref_len;
674 msg_len == 4*sizeof(int64_t)) {
689 upn_len = msg_len;
710 ret = pam_add_response(pd, msg_type, msg_len,
[all...]
H A Dkrb5_child.c931 size_t msg_len; local
938 msg_len = 3;
941 msg_len += vendor_len;
946 msg_len += token_id_len;
951 msg_len += challenge_len;
954 msg = talloc_zero_size(kr, msg_len);
974 ret = pam_add_response(kr->pd, SSS_PAM_OTP_INFO, msg_len, msg);
1442 size_t msg_len; local
1479 &msg_len, &msg);
1484 ret = pam_add_response(kr->pd, SSS_PAM_USER_INFO, msg_len,
[all...]
/sssd/src/providers/ldap/
H A Dldap_auth.c1158 size_t msg_len; local
1256 "accepted.", &msg_len, &msg);
1262 msg_len, msg);
1289 size_t msg_len; local
1316 &msg_len, &msg);
1320 ret = pam_add_response(state->pd, SSS_PAM_USER_INFO, msg_len, msg);
/sssd/src/sss_client/
H A Dpam_sss.c659 uint32_t msg_len; local
669 /* msg_len = legth of message */
670 memcpy(&msg_len, buf + sizeof(uint32_t), sizeof(uint32_t));
672 if (buflen != 2* sizeof(uint32_t) + msg_len) {
679 if (msg_len > 0) {
680 bufsize += strlen(SRV_MSG) + msg_len;
691 msg_len > 0 ? SRV_MSG : "",
692 msg_len,
693 msg_len > 0 ? (char *)(buf + 2 * sizeof(uint32_t)) : "" );
716 uint32_t msg_len; local
[all...]

Completed in 2497 milliseconds