Searched defs:pd (Results 1 - 25 of 36) sorted by relevance

12

/sssd/src/providers/data_provider/
H A Ddp_builtin.c29 struct pam_data *pd; member in struct:dp_access_permit_handler_state
35 struct pam_data *pd,
48 state->pd = pd;
50 state->pd->pam_status = PAM_SUCCESS;
69 *_data = talloc_steal(mem_ctx, state->pd);
75 struct pam_data *pd; member in struct:dp_access_deny_handler_state
81 struct pam_data *pd,
94 state->pd = pd;
33 dp_access_permit_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument
79 dp_access_deny_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Ddp_target_auth.c34 struct pam_data *pd)
40 "Sending result [%d][%s]", pd->pam_status, pd->domain);
49 dbret = dp_pack_pam_response(reply, pd);
68 struct pam_data *pd; local
72 bret = dp_unpack_pam_request(sbus_req->message, mem_ctx, &pd, &dbus_error);
78 pd->pam_status = PAM_SYSTEM_ERR;
79 if (pd->domain == NULL) {
80 pd->domain = talloc_strdup(pd, be_ct
32 dp_pam_reply(struct sbus_request *sbus_req, const char *request_name, struct pam_data *pd) argument
92 choose_target(struct data_provider *provider, struct pam_data *pd, enum dp_targets *_target, enum dp_methods *_method, const char **_req_name) argument
183 struct pam_data *pd = NULL; local
236 should_invoke_selinux(struct data_provider *provider, struct pam_data *pd) argument
253 struct pam_data *pd; local
287 struct pam_data *pd; local
[all...]
/sssd/src/providers/ldap/
H A Dldap_access.c33 struct pam_data *pd; member in struct:sdap_pam_access_handler_state
41 struct pam_data *pd,
55 state->pd = pd;
59 access_ctx->id_ctx->conn, pd);
61 pd->pam_status = PAM_SYSTEM_ERR;
91 state->pd->pam_status = PAM_SUCCESS;
94 state->pd->pam_status = PAM_ACCT_EXPIRED;
99 state->pd->pam_status = PAM_PERM_DENIED;
102 state->pd
39 sdap_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct sdap_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd/src/responder/pam/
H A Dpamsrv_dp.c64 preq->pd->pam_status = PAM_SYSTEM_ERR;
71 ret = dp_unpack_pam_response(msg, preq->pd, &dbus_error);
74 preq->pd->pam_status = PAM_SYSTEM_ERR;
78 "received: [%d (%s)][%s]\n", preq->pd->pam_status,
79 pam_strerror(NULL, preq->pd->pam_status),
80 preq->pd->domain);
84 preq->pd->pam_status = PAM_SYSTEM_ERR;
88 preq->pd->pam_status = PAM_SYSTEM_ERR;
110 struct pam_data *pd = preq->pd; local
[all...]
H A Dpam_LOCAL_domain.c63 struct pam_data *pd; local
65 pd = lreq->preq->pd;
67 if (lreq->error != EOK && pd->pam_status == PAM_SUCCESS)
68 pd->pam_status = PAM_SYSTEM_ERR;
91 lreq->preq->pd->user,
104 struct pam_data *pd; local
106 pd = lreq->preq->pd;
107 pd
144 struct pam_data *pd; local
163 struct pam_data *pd; local
229 struct pam_data *pd = preq->pd; local
[all...]
H A Dpamsrv.h58 struct pam_data *pd; member in struct:pam_auth_req
89 struct pam_data *pd);
93 errno_t add_pam_cert_response(struct pam_data *pd, const char *user,
96 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd);
105 struct pam_data *pd);
H A Dpamsrv_p11.c43 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd) argument
53 if (pd->cmd != SSS_PAM_PREAUTH && pd->cmd != SSS_PAM_AUTHENTICATE) {
57 if (pd->cmd == SSS_PAM_AUTHENTICATE
58 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_PIN
59 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_KEYPAD) {
64 if (pd->service == NULL || *pd->service == '\0') {
68 if (strcmp(pd->service, sc_services[c]) == 0) {
75 pd
82 get_p11_child_write_buffer(TALLOC_CTX *mem_ctx, struct pam_data *pd, uint8_t **_buf, size_t *_len) argument
233 pam_check_cert_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, int child_debug_fd, const char *nss_db, time_t timeout, const char *verify_opts, struct pam_data *pd) argument
515 add_pam_cert_response(struct pam_data *pd, const char *sysdb_username, const char *token_name) argument
[all...]
/sssd/src/providers/
H A Ddp_pam_data_util.c34 struct pam_data *pd = talloc_get_type(ptr, struct pam_data); local
37 sss_authtok_wipe_password(pd->authtok);
38 sss_authtok_wipe_password(pd->newauthtok);
45 struct pam_data *pd; local
47 pd = talloc_zero(mem_ctx, struct pam_data);
48 if (pd == NULL) {
53 pd->pam_status = PAM_SYSTEM_ERR;
55 pd->authtok = sss_authtok_new(pd);
56 if (pd
79 struct pam_data *pd = NULL; local
165 pam_print_data(int l, struct pam_data *pd) argument
181 pam_add_response(struct pam_data *pd, enum response_type type, int len, const uint8_t *data) argument
[all...]
H A Ddp_auth_util.c24 bool dp_pack_pam_request(DBusMessage *msg, struct pam_data *pd) argument
40 if (pd->user == NULL) return false;
41 service = pd->service ? pd->service : "";
42 tty = pd->tty ? pd->tty : "";
43 ruser = pd->ruser ? pd->ruser : "";
44 rhost = pd->rhost ? pd
80 struct pam_data pd; local
142 dp_pack_pam_response(DBusMessage *msg, struct pam_data *pd) argument
231 dp_unpack_pam_response(DBusMessage *msg, struct pam_data *pd, DBusError *dbus_error) argument
[all...]
/sssd/src/providers/ipa/
H A Dipa_access.h51 struct pam_data *pd; member in struct:hbac_ctx
59 struct pam_data *pd,
H A Dipa_auth.c175 struct pam_data *pd; member in struct:ipa_pam_auth_handler_state
187 struct pam_data *pd,
201 state->pd = pd;
206 pd->pam_status = PAM_SYSTEM_ERR;
209 pd, auth_ctx->krb5_auth_ctx);
211 pd->pam_status = PAM_SYSTEM_ERR;
238 state->pd->pam_status = PAM_SYSTEM_ERR;
239 ret = krb5_auth_queue_recv(subreq, &state->pd->pam_status, &dp_err);
241 if (ret != EOK && state->pd
185 ipa_pam_auth_handler_send(TALLOC_CTX *mem_ctx, struct ipa_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dipa_hbac_common.c424 struct pam_data *pd = hbac_ctx->pd; local
445 if (strcasecmp(pd->domain, domain->name) != 0) {
446 user_dom = find_domain_by_name(domain, pd->domain, true);
452 ret = hbac_eval_user_element(eval_req, user_dom, pd->user,
455 ret = hbac_eval_user_element(eval_req, domain, pd->user,
461 ret = hbac_eval_service_element(eval_req, domain, pd->service,
466 if (pd->rhost == NULL || pd->rhost[0] == '\0') {
474 rhost = pd
[all...]
/sssd/src/providers/krb5/
H A Dkrb5_access.c34 struct pam_data *pd; member in struct:krb5_access_state
45 struct pam_data *pd,
64 state->pd = pd;
68 ret = get_domain_or_subdomain(be_ctx, pd->domain, &dom);
74 ret = krb5_setup(state, pd, dom, krb5_ctx, &state->kr);
80 if (pd->cmd != SSS_PAM_ACCT_MGMT) {
99 ret = sysdb_get_user_attr(state, be_ctx->domain, state->pd->user, attrs,
103 "sysdb search for upn of user [%s] failed.\n", pd->user);
110 "No attributes for user [%s] found.\n", pd
42 krb5_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
[all...]
H A Dkrb5_auth.h51 struct pam_data *pd; member in struct:krb5child_req
73 struct pam_data *pd,
81 struct pam_data *pd,
97 struct pam_data *pd,
117 struct pam_data *pd, int pwd_exp_warning,
121 struct pam_data *pd,
130 struct tgt_times *tgtt, struct pam_data *pd,
137 struct pam_data *pd,
145 struct pam_data *pd,
H A Dkrb5_delayed_online_authentication.c48 struct pam_data *pd; member in struct:auth_data
69 struct pam_data *pd = auth_data->pd; local
72 DEBUG_PAM_DATA(SSSDBG_TRACE_ALL, pd);
80 keysize = keyctl_read_alloc(pd->key_serial, (void **)&password);
88 ret = sss_authtok_set_password(pd->authtok, password, keysize);
98 keyrevoke = keyctl_revoke(pd->key_serial);
107 auth_data->pd, auth_data->krb5_ctx);
133 auth_data->pd->user);
136 auth_data->pd
152 struct pam_data *pd; local
236 add_user_to_delayed_online_authentication(struct krb5_ctx *krb5_ctx, struct pam_data *pd, uid_t uid) argument
[all...]
H A Dkrb5_wait_queue.c41 struct pam_data *pd; member in struct:queue_entry
57 qe->be_ctx, qe->pd, qe->krb5_ctx);
102 struct pam_data *pd,
122 key.str = pd->user;
142 queue_entry->pd = pd;
244 struct pam_data *pd; member in struct:krb5_auth_queue_state
255 struct pam_data *pd,
269 state->pd = pd;
100 add_to_wait_queue(struct be_ctx *be_ctx, struct tevent_req *parent_req, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
252 krb5_auth_queue_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
[all...]
H A Dkrb5_renew_tgt.c48 struct pam_data *pd; member in struct:renew_data
54 struct pam_data *pd; member in struct:auth_data
69 req = krb5_auth_queue_send(auth_data, ev, auth_data->be_ctx, auth_data->pd,
75 auth_data->renew_data->pd = talloc_steal(auth_data->renew_data,
76 auth_data->pd);
99 auth_data->renew_data->pd = talloc_steal(auth_data->renew_data,
100 auth_data->pd);
107 auth_data->pd->user);
122 auth_data->pd->user);
135 auth_data->pd
326 struct pam_data pd; local
543 add_tgt_to_renew_table(struct krb5_ctx *krb5_ctx, const char *ccfile, struct tgt_times *tgtt, struct pam_data *pd, const char *upn) argument
[all...]
H A Dkrb5_auth.c178 struct pam_data *pd,
202 kr->pd = pd;
206 pd->user, dom->case_sensitive, &mapped_name);
218 DEBUG(SSSDBG_TRACE_ALL, "No mapping for: %s\n", pd->user);
219 kr->user = pd->user;
247 struct pam_data *pd, uid_t uid,
253 if (sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_PASSWORD) {
260 ret = sss_authtok_get_password(pd->authtok, &password, NULL);
269 ret = sysdb_cache_auth(domain, pd
177 krb5_setup(TALLOC_CTX *mem_ctx, struct pam_data *pd, struct sss_domain_info *dom, struct krb5_ctx *krb5_ctx, struct krb5child_req **_krb5_req) argument
244 krb5_auth_cache_creds(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct confdb_ctx *cdb, struct pam_data *pd, uid_t uid, int *pam_status, int *dp_err) argument
314 krb5_auth_store_creds(struct sss_domain_info *domain, struct pam_data *pd) argument
409 struct pam_data *pd; member in struct:krb5_auth_state
424 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
787 struct pam_data *pd = state->pd; local
1157 struct pam_data *pd; member in struct:krb5_pam_handler_state
1164 krb5_pam_handler_send(TALLOC_CTX *mem_ctx, struct krb5_ctx *krb5_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dkrb5_child_handler.c130 if (kr->pd->cmd == SSS_CMD_RENEW || kr->is_offline) {
145 if (kr->pd->cmd == SSS_PAM_AUTHENTICATE ||
146 kr->pd->cmd == SSS_CMD_RENEW ||
147 kr->pd->cmd == SSS_PAM_CHAUTHTOK_PRELIM ||
148 kr->pd->cmd == SSS_PAM_CHAUTHTOK) {
150 sss_authtok_get_size(kr->pd->authtok);
158 if (kr->pd->cmd == SSS_PAM_CHAUTHTOK) {
160 sss_authtok_get_size(kr->pd->newauthtok);
163 if (kr->pd->cmd == SSS_PAM_ACCT_MGMT) {
176 SAFEALIGN_COPY_UINT32(&buf->data[rp], &kr->pd
601 parse_krb5_child_response(TALLOC_CTX *mem_ctx, uint8_t *buf, ssize_t len, struct pam_data *pd, int pwd_exp_warning, struct krb5_child_response **_res) argument
[all...]
/sssd/src/tests/cmocka/data_provider/
H A Dtest_dp_builtin.c90 struct pam_data *pd; local
95 pd = talloc_zero(test_ctx, struct pam_data);
96 assert_non_null(pd);
98 req = dp_access_deny_handler_send(test_ctx, NULL, pd, test_ctx->params);
105 assert_ptr_equal(pd, out_pd);
106 assert_int_equal(pd->pam_status, PAM_PERM_DENIED);
109 talloc_free(pd);
117 struct pam_data *pd; local
122 pd = talloc_zero(test_ctx, struct pam_data);
123 assert_non_null(pd);
[all...]
/sssd/src/providers/ad/
H A Dad_access.c236 struct pam_data *pd; member in struct:ad_access_state
256 struct pam_data *pd)
269 state->pd = pd;
323 conn, state->pd);
405 state->pd->user,
406 state->pd->service);
461 struct pam_data *pd; member in struct:ad_pam_access_handler_state
469 struct pam_data *pd,
483 state->pd
251 ad_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct sss_domain_info *domain, struct ad_access_ctx *ctx, struct pam_data *pd) argument
467 ad_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct ad_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd/src/providers/proxy/
H A Dproxy.h121 struct pam_data *pd; member in struct:proxy_child_ctx
163 struct pam_data *pd,
H A Dproxy_child.c179 static errno_t call_pam_stack(const char *pam_target, struct pam_data *pd) argument
188 if (pd->cmd == SSS_PAM_CHAUTHTOK) {
194 auth_data = talloc_zero(pd, struct authtok_conv);
214 ret = sss_parse_internal_fqname(auth_data, pd->user, &shortname, NULL);
224 ret = pam_set_item(pamh, PAM_TTY, pd->tty);
229 ret = pam_set_item(pamh, PAM_RUSER, pd->ruser);
234 ret = pam_set_item(pamh, PAM_RHOST, pd->rhost);
239 switch (pd->cmd) {
241 sss_authtok_copy(pd->authtok, auth_data->authtok);
257 sss_authtok_copy(pd
307 struct pam_data *pd = NULL; local
[all...]
/sssd/src/providers/simple/
H A Dsimple_access.c175 struct pam_data *pd; member in struct:simple_access_handler_state
183 struct pam_data *pd,
199 state->pd = pd;
201 pd->pam_status = PAM_SYSTEM_ERR;
202 if (pd->cmd != SSS_PAM_ACCT_MGMT) {
204 "simple access does not handle pam task %d.\n", pd->cmd);
205 pd->pam_status = PAM_MODULE_UNKNOWN;
217 pd->pam_status = PAM_PERM_DENIED;
223 subreq = simple_access_check_send(state, params->ev, simple_ctx, pd
181 simple_access_handler_send(TALLOC_CTX *mem_ctx, struct simple_ctx *simple_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd/src/tests/cmocka/
H A Dtest_krb5_wait_queue.c49 struct pam_data *pd,
125 struct pam_data *pd; member in struct:test_krb5_wait_queue
143 test_ctx->pd = talloc_zero(test_ctx, struct pam_data);
144 assert_non_null(test_ctx->pd);
169 test_ctx->pd->user = discard_const(username);
198 test_ctx->pd,
240 test_ctx->pd,
287 test_ctx->pd,
46 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument

Completed in 5247 milliseconds

12