Searched defs:pd (Results 1 - 25 of 37) sorted by relevance

12

/sssd-io/src/providers/data_provider/
H A Ddp_builtin.c29 struct pam_data *pd; member in struct:dp_access_permit_handler_state
35 struct pam_data *pd,
48 state->pd = pd;
50 state->pd->pam_status = PAM_SUCCESS;
69 *_data = talloc_steal(mem_ctx, state->pd);
75 struct pam_data *pd; member in struct:dp_access_deny_handler_state
81 struct pam_data *pd,
94 state->pd = pd;
33 dp_access_permit_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument
79 dp_access_deny_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Ddp_target_auth.c34 struct pam_data *pd)
40 "Sending result [%d][%s]", pd->pam_status, pd->domain);
49 dbret = dp_pack_pam_response(reply, pd);
68 struct pam_data *pd; local
72 bret = dp_unpack_pam_request(sbus_req->message, mem_ctx, &pd, &dbus_error);
78 pd->pam_status = PAM_SYSTEM_ERR;
79 if (pd->domain == NULL) {
80 pd->domain = talloc_strdup(pd, be_ct
32 dp_pam_reply(struct sbus_request *sbus_req, const char *request_name, struct pam_data *pd) argument
92 choose_target(struct data_provider *provider, struct pam_data *pd, enum dp_targets *_target, enum dp_methods *_method, const char **_req_name) argument
189 struct pam_data *pd = NULL; local
242 should_invoke_selinux(struct data_provider *provider, struct pam_data *pd) argument
259 struct pam_data *pd; local
293 struct pam_data *pd; local
[all...]
/sssd-io/src/providers/ldap/
H A Dldap_access.c33 struct pam_data *pd; member in struct:sdap_pam_access_handler_state
41 struct pam_data *pd,
55 state->pd = pd;
59 access_ctx->id_ctx->conn, pd);
61 pd->pam_status = PAM_SYSTEM_ERR;
91 state->pd->pam_status = PAM_SUCCESS;
94 state->pd->pam_status = PAM_ACCT_EXPIRED;
99 state->pd->pam_status = PAM_PERM_DENIED;
102 state->pd
39 sdap_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct sdap_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd-io/src/responder/pam/
H A Dpamsrv_dp.c64 preq->pd->pam_status = PAM_SYSTEM_ERR;
71 ret = dp_unpack_pam_response(msg, preq->pd, &dbus_error);
74 preq->pd->pam_status = PAM_SYSTEM_ERR;
78 "received: [%d (%s)][%s]\n", preq->pd->pam_status,
79 pam_strerror(NULL, preq->pd->pam_status),
80 preq->pd->domain);
84 preq->pd->pam_status = PAM_SYSTEM_ERR;
88 preq->pd->pam_status = PAM_SYSTEM_ERR;
110 struct pam_data *pd = preq->pd; local
[all...]
H A Dpam_LOCAL_domain.c63 struct pam_data *pd; local
65 pd = lreq->preq->pd;
67 if (lreq->error != EOK && pd->pam_status == PAM_SUCCESS)
68 pd->pam_status = PAM_SYSTEM_ERR;
91 lreq->preq->pd->user,
104 struct pam_data *pd; local
106 pd = lreq->preq->pd;
107 pd
144 struct pam_data *pd; local
163 struct pam_data *pd; local
229 struct pam_data *pd = preq->pd; local
[all...]
H A Dpamsrv.h65 struct pam_data *pd; member in struct:pam_auth_req
111 struct pam_data *pd);
115 errno_t add_pam_cert_response(struct pam_data *pd, const char *sysdb_username,
119 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd);
131 struct pam_data *pd);
/sssd-io/src/providers/
H A Ddp_pam_data_util.c34 struct pam_data *pd = talloc_get_type(ptr, struct pam_data); local
37 sss_authtok_wipe_password(pd->authtok);
38 sss_authtok_wipe_password(pd->newauthtok);
45 struct pam_data *pd; local
47 pd = talloc_zero(mem_ctx, struct pam_data);
48 if (pd == NULL) {
53 pd->pam_status = PAM_SYSTEM_ERR;
55 pd->authtok = sss_authtok_new(pd);
56 if (pd
79 struct pam_data *pd = NULL; local
165 pam_print_data(int l, struct pam_data *pd) argument
181 pam_add_response(struct pam_data *pd, enum response_type type, int len, const uint8_t *data) argument
[all...]
H A Ddp_auth_util.c24 bool dp_pack_pam_request(DBusMessage *msg, struct pam_data *pd) argument
40 if (pd->user == NULL) return false;
41 service = pd->service ? pd->service : "";
42 tty = pd->tty ? pd->tty : "";
43 ruser = pd->ruser ? pd->ruser : "";
44 rhost = pd->rhost ? pd
80 struct pam_data pd; local
142 dp_pack_pam_response(DBusMessage *msg, struct pam_data *pd) argument
231 dp_unpack_pam_response(DBusMessage *msg, struct pam_data *pd, DBusError *dbus_error) argument
[all...]
/sssd-io/src/providers/ipa/
H A Dipa_access.h50 struct pam_data *pd; member in struct:hbac_ctx
58 struct pam_data *pd,
H A Dipa_auth.c174 struct pam_data *pd; member in struct:ipa_pam_auth_handler_state
187 struct pam_data *pd,
201 state->pd = pd;
206 state->pd->domain,
209 DEBUG(SSSDBG_CRIT_FAILURE, "Unknown domain %s\n", state->pd->domain);
210 pd->pam_status = PAM_SYSTEM_ERR;
214 pd->pam_status = PAM_SYSTEM_ERR;
217 pd, auth_ctx->krb5_auth_ctx);
219 pd
185 ipa_pam_auth_handler_send(TALLOC_CTX *mem_ctx, struct ipa_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dipa_hbac_common.c291 struct pam_data *pd = hbac_ctx->pd; local
312 if (strcasecmp(pd->domain, domain->name) != 0) {
313 user_dom = find_domain_by_name(domain, pd->domain, true);
319 ret = hbac_eval_user_element(eval_req, user_dom, pd->user,
322 ret = hbac_eval_user_element(eval_req, domain, pd->user,
328 ret = hbac_eval_service_element(eval_req, domain, pd->service,
333 if (pd->rhost == NULL || pd->rhost[0] == '\0') {
341 rhost = pd
[all...]
H A Dipa_access.c472 struct pam_data *pd)
490 hbac_ctx.pd = pd;
552 struct pam_data *pd; member in struct:ipa_pam_access_handler_state
561 struct pam_data *pd,
575 state->pd = pd;
582 access_ctx->sdap_ctx->conn, pd);
584 state->pd->pam_status = PAM_SYSTEM_ERR;
617 state->pd
470 ipa_hbac_evaluate_rules(struct be_ctx *be_ctx, struct dp_option *ipa_options, struct pam_data *pd) argument
559 ipa_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct ipa_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dipa_session.c439 struct pam_data *pd; member in struct:ipa_pam_session_handler_state
482 struct pam_data *pd,
498 state->pd = pd;
510 pd->user,
520 state->pd->pam_status = PAM_SESSION_ERR;
533 state->pd->pam_status = PAM_SESSION_ERR;
538 state->session_ctx, pd->user);
540 state->pd->pam_status = PAM_SESSION_ERR;
574 state->pd
480 ipa_pam_session_handler_send(TALLOC_CTX *mem_ctx, struct ipa_session_ctx *session_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd-io/src/providers/krb5/
H A Dkrb5_access.c34 struct pam_data *pd; member in struct:krb5_access_state
45 struct pam_data *pd,
64 state->pd = pd;
68 ret = get_domain_or_subdomain(be_ctx, pd->domain, &dom);
74 ret = krb5_setup(state, pd, dom, krb5_ctx, &state->kr);
80 if (pd->cmd != SSS_PAM_ACCT_MGMT) {
99 ret = sysdb_get_user_attr(state, be_ctx->domain, state->pd->user, attrs,
103 "sysdb search for upn of user [%s] failed.\n", pd->user);
110 "No attributes for user [%s] found.\n", pd
42 krb5_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
[all...]
H A Dkrb5_auth.h52 struct pam_data *pd; member in struct:krb5child_req
75 struct pam_data *pd,
83 struct pam_data *pd,
99 struct pam_data *pd,
119 struct pam_data *pd, int pwd_exp_warning,
124 struct pam_data *pd,
133 struct tgt_times *tgtt, struct pam_data *pd,
140 struct pam_data *pd,
148 struct pam_data *pd,
H A Dkrb5_delayed_online_authentication.c48 struct pam_data *pd; member in struct:auth_data
69 struct pam_data *pd = auth_data->pd; local
72 DEBUG_PAM_DATA(SSSDBG_TRACE_ALL, pd);
80 keysize = keyctl_read_alloc(pd->key_serial, (void **)&password);
88 ret = sss_authtok_set_password(pd->authtok, password, keysize);
98 keyrevoke = keyctl_revoke(pd->key_serial);
107 auth_data->pd, auth_data->krb5_ctx);
133 auth_data->pd->user);
136 auth_data->pd
152 struct pam_data *pd; local
236 add_user_to_delayed_online_authentication(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct pam_data *pd, uid_t uid) argument
[all...]
H A Dkrb5_wait_queue.c41 struct pam_data *pd; member in struct:queue_entry
57 qe->be_ctx, qe->pd, qe->krb5_ctx);
102 struct pam_data *pd,
122 key.str = pd->user;
142 queue_entry->pd = pd;
244 struct pam_data *pd; member in struct:krb5_auth_queue_state
255 struct pam_data *pd,
269 state->pd = pd;
100 add_to_wait_queue(struct be_ctx *be_ctx, struct tevent_req *parent_req, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
252 krb5_auth_queue_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
[all...]
H A Dkrb5_renew_tgt.c48 struct pam_data *pd; member in struct:renew_data
54 struct pam_data *pd; member in struct:auth_data
69 req = krb5_auth_queue_send(auth_data, ev, auth_data->be_ctx, auth_data->pd,
75 auth_data->renew_data->pd = talloc_steal(auth_data->renew_data,
76 auth_data->pd);
99 auth_data->renew_data->pd = talloc_steal(auth_data->renew_data,
100 auth_data->pd);
107 auth_data->pd->user);
122 auth_data->pd->user);
135 auth_data->pd
326 struct pam_data pd; local
542 add_tgt_to_renew_table(struct krb5_ctx *krb5_ctx, const char *ccfile, struct tgt_times *tgtt, struct pam_data *pd, const char *upn) argument
[all...]
H A Dkrb5_auth.c180 struct pam_data *pd,
204 kr->pd = pd;
209 pd->user, dom->case_sensitive, &mapped_name);
221 DEBUG(SSSDBG_TRACE_ALL, "No mapping for: %s\n", pd->user);
222 kr->user = pd->user;
250 struct pam_data *pd, uid_t uid,
256 ret = sss_authtok_get_password(pd->authtok, &password, NULL);
267 ret = sysdb_cache_auth(domain, pd->user,
276 ret = add_user_to_delayed_online_authentication(krb5_ctx, domain, pd, ui
179 krb5_setup(TALLOC_CTX *mem_ctx, struct pam_data *pd, struct sss_domain_info *dom, struct krb5_ctx *krb5_ctx, struct krb5child_req **_krb5_req) argument
247 krb5_auth_cache_creds(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct confdb_ctx *cdb, struct pam_data *pd, uid_t uid, int *pam_status, int *dp_err) argument
337 krb5_auth_store_creds(struct sss_domain_info *domain, struct pam_data *pd) argument
437 struct pam_data *pd; member in struct:krb5_auth_state
452 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
817 struct pam_data *pd = state->pd; local
1205 struct pam_data *pd; member in struct:krb5_pam_handler_state
1212 krb5_pam_handler_send(TALLOC_CTX *mem_ctx, struct krb5_ctx *krb5_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd-io/src/tests/cmocka/data_provider/
H A Dtest_dp_builtin.c90 struct pam_data *pd; local
95 pd = talloc_zero(test_ctx, struct pam_data);
96 assert_non_null(pd);
98 req = dp_access_deny_handler_send(test_ctx, NULL, pd, test_ctx->params);
105 assert_ptr_equal(pd, out_pd);
106 assert_int_equal(pd->pam_status, PAM_PERM_DENIED);
109 talloc_free(pd);
117 struct pam_data *pd; local
122 pd = talloc_zero(test_ctx, struct pam_data);
123 assert_non_null(pd);
[all...]
/sssd-io/src/providers/ad/
H A Dad_access.c236 struct pam_data *pd; member in struct:ad_access_state
256 struct pam_data *pd)
269 state->pd = pd;
323 conn, state->pd);
405 state->pd->user,
406 state->pd->service);
461 struct pam_data *pd; member in struct:ad_pam_access_handler_state
469 struct pam_data *pd,
483 state->pd
251 ad_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, struct ad_access_ctx *ctx, struct pam_data *pd) argument
467 ad_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct ad_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd-io/src/providers/proxy/
H A Dproxy.h121 struct pam_data *pd; member in struct:proxy_child_ctx
163 struct pam_data *pd,
H A Dproxy_child.c179 static errno_t call_pam_stack(const char *pam_target, struct pam_data *pd) argument
188 if (pd->cmd == SSS_PAM_CHAUTHTOK) {
194 auth_data = talloc_zero(pd, struct authtok_conv);
214 ret = sss_parse_internal_fqname(auth_data, pd->user, &shortname, NULL);
224 ret = pam_set_item(pamh, PAM_TTY, pd->tty);
229 ret = pam_set_item(pamh, PAM_RUSER, pd->ruser);
234 ret = pam_set_item(pamh, PAM_RHOST, pd->rhost);
239 switch (pd->cmd) {
241 sss_authtok_copy(pd->authtok, auth_data->authtok);
257 sss_authtok_copy(pd
307 struct pam_data *pd = NULL; local
[all...]
/sssd-io/src/providers/simple/
H A Dsimple_access.c175 struct pam_data *pd; member in struct:simple_access_handler_state
183 struct pam_data *pd,
199 state->pd = pd;
201 pd->pam_status = PAM_SYSTEM_ERR;
202 if (pd->cmd != SSS_PAM_ACCT_MGMT) {
204 "simple access does not handle pam task %d.\n", pd->cmd);
205 pd->pam_status = PAM_MODULE_UNKNOWN;
217 pd->pam_status = PAM_PERM_DENIED;
223 subreq = simple_access_check_send(state, params->ev, simple_ctx, pd
181 simple_access_handler_send(TALLOC_CTX *mem_ctx, struct simple_ctx *simple_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd-io/src/tests/cmocka/
H A Dtest_krb5_wait_queue.c49 struct pam_data *pd,
125 struct pam_data *pd; member in struct:test_krb5_wait_queue
143 test_ctx->pd = talloc_zero(test_ctx, struct pam_data);
144 assert_non_null(test_ctx->pd);
169 test_ctx->pd->user = discard_const(username);
198 test_ctx->pd,
240 test_ctx->pd,
287 test_ctx->pd,
46 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument

Completed in 116 milliseconds

12