/sssd/src/providers/data_provider/ |
H A D | dp_builtin.c | 29 struct pam_data *pd; member in struct:dp_access_permit_handler_state 35 struct pam_data *pd, 48 state->pd = pd; 50 state->pd->pam_status = PAM_SUCCESS; 69 *_data = talloc_steal(mem_ctx, state->pd); 75 struct pam_data *pd; member in struct:dp_access_deny_handler_state 81 struct pam_data *pd, 94 state->pd = pd; 33 dp_access_permit_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument 79 dp_access_deny_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | dp_target_auth.c | 34 struct pam_data *pd) 40 "Sending result [%d][%s]", pd->pam_status, pd->domain); 49 dbret = dp_pack_pam_response(reply, pd); 68 struct pam_data *pd; local 72 bret = dp_unpack_pam_request(sbus_req->message, mem_ctx, &pd, &dbus_error); 78 pd->pam_status = PAM_SYSTEM_ERR; 79 if (pd->domain == NULL) { 80 pd->domain = talloc_strdup(pd, be_ct 32 dp_pam_reply(struct sbus_request *sbus_req, const char *request_name, struct pam_data *pd) argument 92 choose_target(struct data_provider *provider, struct pam_data *pd, enum dp_targets *_target, enum dp_methods *_method, const char **_req_name) argument 183 struct pam_data *pd = NULL; local 236 should_invoke_selinux(struct data_provider *provider, struct pam_data *pd) argument 253 struct pam_data *pd; local 287 struct pam_data *pd; local [all...] |
/sssd/src/providers/ldap/ |
H A D | ldap_access.c | 33 struct pam_data *pd; member in struct:sdap_pam_access_handler_state 41 struct pam_data *pd, 55 state->pd = pd; 59 access_ctx->id_ctx->conn, pd); 61 pd->pam_status = PAM_SYSTEM_ERR; 91 state->pd->pam_status = PAM_SUCCESS; 94 state->pd->pam_status = PAM_ACCT_EXPIRED; 99 state->pd->pam_status = PAM_PERM_DENIED; 102 state->pd 39 sdap_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct sdap_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
/sssd/src/responder/pam/ |
H A D | pamsrv_dp.c | 64 preq->pd->pam_status = PAM_SYSTEM_ERR; 71 ret = dp_unpack_pam_response(msg, preq->pd, &dbus_error); 74 preq->pd->pam_status = PAM_SYSTEM_ERR; 78 "received: [%d (%s)][%s]\n", preq->pd->pam_status, 79 pam_strerror(NULL, preq->pd->pam_status), 80 preq->pd->domain); 84 preq->pd->pam_status = PAM_SYSTEM_ERR; 88 preq->pd->pam_status = PAM_SYSTEM_ERR; 110 struct pam_data *pd = preq->pd; local [all...] |
H A D | pam_LOCAL_domain.c | 63 struct pam_data *pd; local 65 pd = lreq->preq->pd; 67 if (lreq->error != EOK && pd->pam_status == PAM_SUCCESS) 68 pd->pam_status = PAM_SYSTEM_ERR; 91 lreq->preq->pd->user, 104 struct pam_data *pd; local 106 pd = lreq->preq->pd; 107 pd 144 struct pam_data *pd; local 163 struct pam_data *pd; local 229 struct pam_data *pd = preq->pd; local [all...] |
H A D | pamsrv.h | 58 struct pam_data *pd; member in struct:pam_auth_req 89 struct pam_data *pd); 93 errno_t add_pam_cert_response(struct pam_data *pd, const char *user, 96 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd); 105 struct pam_data *pd);
|
H A D | pamsrv_p11.c | 43 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd) argument 53 if (pd->cmd != SSS_PAM_PREAUTH && pd->cmd != SSS_PAM_AUTHENTICATE) { 57 if (pd->cmd == SSS_PAM_AUTHENTICATE 58 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_PIN 59 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_KEYPAD) { 64 if (pd->service == NULL || *pd->service == '\0') { 68 if (strcmp(pd->service, sc_services[c]) == 0) { 75 pd 82 get_p11_child_write_buffer(TALLOC_CTX *mem_ctx, struct pam_data *pd, uint8_t **_buf, size_t *_len) argument 233 pam_check_cert_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, int child_debug_fd, const char *nss_db, time_t timeout, const char *verify_opts, struct pam_data *pd) argument 515 add_pam_cert_response(struct pam_data *pd, const char *sysdb_username, const char *token_name) argument [all...] |
/sssd/src/providers/ |
H A D | dp_pam_data_util.c | 34 struct pam_data *pd = talloc_get_type(ptr, struct pam_data); local 37 sss_authtok_wipe_password(pd->authtok); 38 sss_authtok_wipe_password(pd->newauthtok); 45 struct pam_data *pd; local 47 pd = talloc_zero(mem_ctx, struct pam_data); 48 if (pd == NULL) { 53 pd->pam_status = PAM_SYSTEM_ERR; 55 pd->authtok = sss_authtok_new(pd); 56 if (pd 79 struct pam_data *pd = NULL; local 165 pam_print_data(int l, struct pam_data *pd) argument 181 pam_add_response(struct pam_data *pd, enum response_type type, int len, const uint8_t *data) argument [all...] |
H A D | dp_auth_util.c | 24 bool dp_pack_pam_request(DBusMessage *msg, struct pam_data *pd) argument 40 if (pd->user == NULL) return false; 41 service = pd->service ? pd->service : ""; 42 tty = pd->tty ? pd->tty : ""; 43 ruser = pd->ruser ? pd->ruser : ""; 44 rhost = pd->rhost ? pd 80 struct pam_data pd; local 142 dp_pack_pam_response(DBusMessage *msg, struct pam_data *pd) argument 231 dp_unpack_pam_response(DBusMessage *msg, struct pam_data *pd, DBusError *dbus_error) argument [all...] |
/sssd/src/providers/ipa/ |
H A D | ipa_access.h | 51 struct pam_data *pd; member in struct:hbac_ctx 59 struct pam_data *pd,
|
H A D | ipa_auth.c | 175 struct pam_data *pd; member in struct:ipa_pam_auth_handler_state 187 struct pam_data *pd, 201 state->pd = pd; 206 pd->pam_status = PAM_SYSTEM_ERR; 209 pd, auth_ctx->krb5_auth_ctx); 211 pd->pam_status = PAM_SYSTEM_ERR; 238 state->pd->pam_status = PAM_SYSTEM_ERR; 239 ret = krb5_auth_queue_recv(subreq, &state->pd->pam_status, &dp_err); 241 if (ret != EOK && state->pd 185 ipa_pam_auth_handler_send(TALLOC_CTX *mem_ctx, struct ipa_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | ipa_hbac_common.c | 424 struct pam_data *pd = hbac_ctx->pd; local 445 if (strcasecmp(pd->domain, domain->name) != 0) { 446 user_dom = find_domain_by_name(domain, pd->domain, true); 452 ret = hbac_eval_user_element(eval_req, user_dom, pd->user, 455 ret = hbac_eval_user_element(eval_req, domain, pd->user, 461 ret = hbac_eval_service_element(eval_req, domain, pd->service, 466 if (pd->rhost == NULL || pd->rhost[0] == '\0') { 474 rhost = pd [all...] |
/sssd/src/providers/krb5/ |
H A D | krb5_access.c | 34 struct pam_data *pd; member in struct:krb5_access_state 45 struct pam_data *pd, 64 state->pd = pd; 68 ret = get_domain_or_subdomain(be_ctx, pd->domain, &dom); 74 ret = krb5_setup(state, pd, dom, krb5_ctx, &state->kr); 80 if (pd->cmd != SSS_PAM_ACCT_MGMT) { 99 ret = sysdb_get_user_attr(state, be_ctx->domain, state->pd->user, attrs, 103 "sysdb search for upn of user [%s] failed.\n", pd->user); 110 "No attributes for user [%s] found.\n", pd 42 krb5_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument [all...] |
H A D | krb5_auth.h | 51 struct pam_data *pd; member in struct:krb5child_req 73 struct pam_data *pd, 81 struct pam_data *pd, 97 struct pam_data *pd, 117 struct pam_data *pd, int pwd_exp_warning, 121 struct pam_data *pd, 130 struct tgt_times *tgtt, struct pam_data *pd, 137 struct pam_data *pd, 145 struct pam_data *pd,
|
H A D | krb5_delayed_online_authentication.c | 48 struct pam_data *pd; member in struct:auth_data 69 struct pam_data *pd = auth_data->pd; local 72 DEBUG_PAM_DATA(SSSDBG_TRACE_ALL, pd); 80 keysize = keyctl_read_alloc(pd->key_serial, (void **)&password); 88 ret = sss_authtok_set_password(pd->authtok, password, keysize); 98 keyrevoke = keyctl_revoke(pd->key_serial); 107 auth_data->pd, auth_data->krb5_ctx); 133 auth_data->pd->user); 136 auth_data->pd 152 struct pam_data *pd; local 236 add_user_to_delayed_online_authentication(struct krb5_ctx *krb5_ctx, struct pam_data *pd, uid_t uid) argument [all...] |
H A D | krb5_wait_queue.c | 41 struct pam_data *pd; member in struct:queue_entry 57 qe->be_ctx, qe->pd, qe->krb5_ctx); 102 struct pam_data *pd, 122 key.str = pd->user; 142 queue_entry->pd = pd; 244 struct pam_data *pd; member in struct:krb5_auth_queue_state 255 struct pam_data *pd, 269 state->pd = pd; 100 add_to_wait_queue(struct be_ctx *be_ctx, struct tevent_req *parent_req, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument 252 krb5_auth_queue_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument [all...] |
H A D | krb5_renew_tgt.c | 48 struct pam_data *pd; member in struct:renew_data 54 struct pam_data *pd; member in struct:auth_data 69 req = krb5_auth_queue_send(auth_data, ev, auth_data->be_ctx, auth_data->pd, 75 auth_data->renew_data->pd = talloc_steal(auth_data->renew_data, 76 auth_data->pd); 99 auth_data->renew_data->pd = talloc_steal(auth_data->renew_data, 100 auth_data->pd); 107 auth_data->pd->user); 122 auth_data->pd->user); 135 auth_data->pd 326 struct pam_data pd; local 543 add_tgt_to_renew_table(struct krb5_ctx *krb5_ctx, const char *ccfile, struct tgt_times *tgtt, struct pam_data *pd, const char *upn) argument [all...] |
H A D | krb5_auth.c | 178 struct pam_data *pd, 202 kr->pd = pd; 206 pd->user, dom->case_sensitive, &mapped_name); 218 DEBUG(SSSDBG_TRACE_ALL, "No mapping for: %s\n", pd->user); 219 kr->user = pd->user; 247 struct pam_data *pd, uid_t uid, 253 if (sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_PASSWORD) { 260 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 269 ret = sysdb_cache_auth(domain, pd 177 krb5_setup(TALLOC_CTX *mem_ctx, struct pam_data *pd, struct sss_domain_info *dom, struct krb5_ctx *krb5_ctx, struct krb5child_req **_krb5_req) argument 244 krb5_auth_cache_creds(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct confdb_ctx *cdb, struct pam_data *pd, uid_t uid, int *pam_status, int *dp_err) argument 314 krb5_auth_store_creds(struct sss_domain_info *domain, struct pam_data *pd) argument 409 struct pam_data *pd; member in struct:krb5_auth_state 424 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument 787 struct pam_data *pd = state->pd; local 1157 struct pam_data *pd; member in struct:krb5_pam_handler_state 1164 krb5_pam_handler_send(TALLOC_CTX *mem_ctx, struct krb5_ctx *krb5_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | krb5_child_handler.c | 130 if (kr->pd->cmd == SSS_CMD_RENEW || kr->is_offline) { 145 if (kr->pd->cmd == SSS_PAM_AUTHENTICATE || 146 kr->pd->cmd == SSS_CMD_RENEW || 147 kr->pd->cmd == SSS_PAM_CHAUTHTOK_PRELIM || 148 kr->pd->cmd == SSS_PAM_CHAUTHTOK) { 150 sss_authtok_get_size(kr->pd->authtok); 158 if (kr->pd->cmd == SSS_PAM_CHAUTHTOK) { 160 sss_authtok_get_size(kr->pd->newauthtok); 163 if (kr->pd->cmd == SSS_PAM_ACCT_MGMT) { 176 SAFEALIGN_COPY_UINT32(&buf->data[rp], &kr->pd 601 parse_krb5_child_response(TALLOC_CTX *mem_ctx, uint8_t *buf, ssize_t len, struct pam_data *pd, int pwd_exp_warning, struct krb5_child_response **_res) argument [all...] |
/sssd/src/tests/cmocka/data_provider/ |
H A D | test_dp_builtin.c | 90 struct pam_data *pd; local 95 pd = talloc_zero(test_ctx, struct pam_data); 96 assert_non_null(pd); 98 req = dp_access_deny_handler_send(test_ctx, NULL, pd, test_ctx->params); 105 assert_ptr_equal(pd, out_pd); 106 assert_int_equal(pd->pam_status, PAM_PERM_DENIED); 109 talloc_free(pd); 117 struct pam_data *pd; local 122 pd = talloc_zero(test_ctx, struct pam_data); 123 assert_non_null(pd); [all...] |
/sssd/src/providers/ad/ |
H A D | ad_access.c | 236 struct pam_data *pd; member in struct:ad_access_state 256 struct pam_data *pd) 269 state->pd = pd; 323 conn, state->pd); 405 state->pd->user, 406 state->pd->service); 461 struct pam_data *pd; member in struct:ad_pam_access_handler_state 469 struct pam_data *pd, 483 state->pd 251 ad_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, struct ad_access_ctx *ctx, struct pam_data *pd) argument 467 ad_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct ad_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
/sssd/src/providers/proxy/ |
H A D | proxy.h | 121 struct pam_data *pd; member in struct:proxy_child_ctx 163 struct pam_data *pd,
|
H A D | proxy_child.c | 179 static errno_t call_pam_stack(const char *pam_target, struct pam_data *pd) argument 188 if (pd->cmd == SSS_PAM_CHAUTHTOK) { 194 auth_data = talloc_zero(pd, struct authtok_conv); 214 ret = sss_parse_internal_fqname(auth_data, pd->user, &shortname, NULL); 224 ret = pam_set_item(pamh, PAM_TTY, pd->tty); 229 ret = pam_set_item(pamh, PAM_RUSER, pd->ruser); 234 ret = pam_set_item(pamh, PAM_RHOST, pd->rhost); 239 switch (pd->cmd) { 241 sss_authtok_copy(pd->authtok, auth_data->authtok); 257 sss_authtok_copy(pd 307 struct pam_data *pd = NULL; local [all...] |
/sssd/src/providers/simple/ |
H A D | simple_access.c | 175 struct pam_data *pd; member in struct:simple_access_handler_state 183 struct pam_data *pd, 199 state->pd = pd; 201 pd->pam_status = PAM_SYSTEM_ERR; 202 if (pd->cmd != SSS_PAM_ACCT_MGMT) { 204 "simple access does not handle pam task %d.\n", pd->cmd); 205 pd->pam_status = PAM_MODULE_UNKNOWN; 217 pd->pam_status = PAM_PERM_DENIED; 223 subreq = simple_access_check_send(state, params->ev, simple_ctx, pd 181 simple_access_handler_send(TALLOC_CTX *mem_ctx, struct simple_ctx *simple_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
/sssd/src/tests/cmocka/ |
H A D | test_krb5_wait_queue.c | 49 struct pam_data *pd, 125 struct pam_data *pd; member in struct:test_krb5_wait_queue 143 test_ctx->pd = talloc_zero(test_ctx, struct pam_data); 144 assert_non_null(test_ctx->pd); 169 test_ctx->pd->user = discard_const(username); 198 test_ctx->pd, 240 test_ctx->pd, 287 test_ctx->pd, 46 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
|