/sssd/src/providers/ |
H A D | dp_pam_data_util.c | 34 struct pam_data *pd = talloc_get_type(ptr, struct pam_data); local 37 sss_authtok_wipe_password(pd->authtok); 38 sss_authtok_wipe_password(pd->newauthtok); 45 struct pam_data *pd; local 47 pd = talloc_zero(mem_ctx, struct pam_data); 48 if (pd == NULL) { 53 pd->pam_status = PAM_SYSTEM_ERR; 55 pd->authtok = sss_authtok_new(pd); 56 if (pd 79 struct pam_data *pd = NULL; local 165 pam_print_data(int l, struct pam_data *pd) argument 181 pam_add_response(struct pam_data *pd, enum response_type type, int len, const uint8_t *data) argument [all...] |
H A D | dp_auth_util.c | 24 bool dp_pack_pam_request(DBusMessage *msg, struct pam_data *pd) argument 40 if (pd->user == NULL) return false; 41 service = pd->service ? pd->service : ""; 42 tty = pd->tty ? pd->tty : ""; 43 ruser = pd->ruser ? pd->ruser : ""; 44 rhost = pd->rhost ? pd 80 struct pam_data pd; local 142 dp_pack_pam_response(DBusMessage *msg, struct pam_data *pd) argument 231 dp_unpack_pam_response(DBusMessage *msg, struct pam_data *pd, DBusError *dbus_error) argument [all...] |
/sssd/src/providers/data_provider/ |
H A D | dp_target_auth.c | 34 struct pam_data *pd) 40 "Sending result [%d][%s]", pd->pam_status, pd->domain); 49 dbret = dp_pack_pam_response(reply, pd); 68 struct pam_data *pd; local 72 bret = dp_unpack_pam_request(sbus_req->message, mem_ctx, &pd, &dbus_error); 78 pd->pam_status = PAM_SYSTEM_ERR; 79 if (pd->domain == NULL) { 80 pd->domain = talloc_strdup(pd, be_ct 32 dp_pam_reply(struct sbus_request *sbus_req, const char *request_name, struct pam_data *pd) argument 92 choose_target(struct data_provider *provider, struct pam_data *pd, enum dp_targets *_target, enum dp_methods *_method, const char **_req_name) argument 183 struct pam_data *pd = NULL; local 236 should_invoke_selinux(struct data_provider *provider, struct pam_data *pd) argument 253 struct pam_data *pd; local 287 struct pam_data *pd; local [all...] |
H A D | dp_builtin.c | 29 struct pam_data *pd; member in struct:dp_access_permit_handler_state 35 struct pam_data *pd, 48 state->pd = pd; 50 state->pd->pam_status = PAM_SUCCESS; 69 *_data = talloc_steal(mem_ctx, state->pd); 75 struct pam_data *pd; member in struct:dp_access_deny_handler_state 81 struct pam_data *pd, 94 state->pd = pd; 33 dp_access_permit_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument 79 dp_access_deny_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | dp_builtin.h | 31 struct pam_data *pd, 42 struct pam_data *pd,
|
/sssd/src/providers/ldap/ |
H A D | ldap_access.c | 33 struct pam_data *pd; member in struct:sdap_pam_access_handler_state 41 struct pam_data *pd, 55 state->pd = pd; 59 access_ctx->id_ctx->conn, pd); 61 pd->pam_status = PAM_SYSTEM_ERR; 91 state->pd->pam_status = PAM_SUCCESS; 94 state->pd->pam_status = PAM_ACCT_EXPIRED; 99 state->pd->pam_status = PAM_PERM_DENIED; 102 state->pd 39 sdap_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct sdap_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | ldap_auth.c | 55 static errno_t add_expired_warning(struct pam_data *pd, long exp_time) argument 65 data = talloc_array(pd, uint32_t, 2); 74 ret = pam_add_response(pd, SSS_PAM_USER_INFO, 2 * sizeof(uint32_t), 84 struct pam_data *pd, 113 if (pd != NULL && 116 ret = add_expired_warning(pd, (long) difftime(expire_time, now)); 128 struct pam_data *pd) 162 if (pd != NULL && spwd->sp_max != -1 && spwd->sp_warn != -1 && 172 ret = add_expired_warning(pd, exp); 181 static errno_t check_pwexpire_ldap(struct pam_data *pd, argument 83 check_pwexpire_kerberos(const char *expire_date, time_t now, struct pam_data *pd, int pwd_exp_warning) argument 127 check_pwexpire_shadow(struct spwd *spwd, time_t now, struct pam_data *pd) argument 229 check_pwexpire_policy(enum pwexpire pw_expire_type, void *pw_expire_data, struct pam_data *pd, int pwd_expiration_warning) argument 907 struct pam_data *pd; member in struct:sdap_pam_auth_handler_state 914 sdap_pam_auth_handler_send(TALLOC_CTX *mem_ctx, struct sdap_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument 1078 struct pam_data *pd; member in struct:sdap_pam_chpass_handler_state 1088 sdap_pam_chpass_handler_send(TALLOC_CTX *mem_ctx, struct sdap_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | ldap_auth.h | 42 struct pam_data *pd,
|
/sssd/src/responder/pam/ |
H A D | pam_LOCAL_domain.c | 63 struct pam_data *pd; local 65 pd = lreq->preq->pd; 67 if (lreq->error != EOK && pd->pam_status == PAM_SUCCESS) 68 pd->pam_status = PAM_SYSTEM_ERR; 91 lreq->preq->pd->user, 104 struct pam_data *pd; local 106 pd = lreq->preq->pd; 107 pd 144 struct pam_data *pd; local 163 struct pam_data *pd; local 229 struct pam_data *pd = preq->pd; local [all...] |
H A D | pamsrv_cmd.c | 86 static void inform_user(struct pam_data* pd, const char *pam_message) argument 92 ret = pack_user_info_msg(pd, pam_message, &msg_len, &msg); 97 ret = pam_add_response(pd, SSS_PAM_USER_INFO, msg_len, msg); 104 static bool is_domain_requested(struct pam_data *pd, const char *domain_name) argument 111 if (!pd->requested_domains) { 115 for (i = 0; pd->requested_domains[i]; i++) { 116 if (strcasecmp(domain_name, pd->requested_domains[i])) { 207 static int pd_set_primary_name(const struct ldb_message *msg,struct pam_data *pd) argument 217 if (strcmp(pd->user, name)) { 219 talloc_free(pd 227 pam_parse_in_data_v2(struct pam_data *pd, uint8_t *body, size_t blen) argument 330 pam_parse_in_data_v3(struct pam_data *pd, uint8_t *body, size_t blen) argument 378 pam_parse_in_data(struct pam_data *pd, uint8_t *body, size_t blen) argument 473 filter_responses_env(struct response_data *resp, struct pam_data *pd, char * const *pam_filter_opts) argument 546 filter_responses(struct confdb_ctx *cdb, struct response_data *resp_list, struct pam_data *pd) argument 695 struct pam_data *pd; local 1061 pam_forwarder_parse_data(struct cli_ctx *cctx, struct pam_data *pd) argument 1174 check_cert(TALLOC_CTX *mctx, struct tevent_context *ev, struct pam_ctx *pctx, struct pam_auth_req *preq, struct pam_data *pd) argument 1223 struct pam_data *pd; local 1367 struct pam_data *pd; local 1501 struct pam_data *pd; local [all...] |
H A D | pamsrv_dp.c | 64 preq->pd->pam_status = PAM_SYSTEM_ERR; 71 ret = dp_unpack_pam_response(msg, preq->pd, &dbus_error); 74 preq->pd->pam_status = PAM_SYSTEM_ERR; 78 "received: [%d (%s)][%s]\n", preq->pd->pam_status, 79 pam_strerror(NULL, preq->pd->pam_status), 80 preq->pd->domain); 84 preq->pd->pam_status = PAM_SYSTEM_ERR; 88 preq->pd->pam_status = PAM_SYSTEM_ERR; 110 struct pam_data *pd = preq->pd; local [all...] |
H A D | pamsrv.h | 58 struct pam_data *pd; member in struct:pam_auth_req 89 struct pam_data *pd); 93 errno_t add_pam_cert_response(struct pam_data *pd, const char *user, 96 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd); 105 struct pam_data *pd);
|
H A D | pamsrv_p11.c | 43 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd) argument 53 if (pd->cmd != SSS_PAM_PREAUTH && pd->cmd != SSS_PAM_AUTHENTICATE) { 57 if (pd->cmd == SSS_PAM_AUTHENTICATE 58 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_PIN 59 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_KEYPAD) { 64 if (pd->service == NULL || *pd->service == '\0') { 68 if (strcmp(pd->service, sc_services[c]) == 0) { 75 pd 82 get_p11_child_write_buffer(TALLOC_CTX *mem_ctx, struct pam_data *pd, uint8_t **_buf, size_t *_len) argument 233 pam_check_cert_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, int child_debug_fd, const char *nss_db, time_t timeout, const char *verify_opts, struct pam_data *pd) argument 515 add_pam_cert_response(struct pam_data *pd, const char *sysdb_username, const char *token_name) argument [all...] |
/sssd/src/providers/ipa/ |
H A D | ipa_auth.h | 34 struct pam_data *pd,
|
H A D | ipa_auth.c | 175 struct pam_data *pd; member in struct:ipa_pam_auth_handler_state 187 struct pam_data *pd, 201 state->pd = pd; 206 pd->pam_status = PAM_SYSTEM_ERR; 209 pd, auth_ctx->krb5_auth_ctx); 211 pd->pam_status = PAM_SYSTEM_ERR; 238 state->pd->pam_status = PAM_SYSTEM_ERR; 239 ret = krb5_auth_queue_recv(subreq, &state->pd->pam_status, &dp_err); 241 if (ret != EOK && state->pd 185 ipa_pam_auth_handler_send(TALLOC_CTX *mem_ctx, struct ipa_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | ipa_access.h | 51 struct pam_data *pd; member in struct:hbac_ctx 59 struct pam_data *pd,
|
/sssd/src/providers/krb5/ |
H A D | krb5_access.c | 34 struct pam_data *pd; member in struct:krb5_access_state 45 struct pam_data *pd, 64 state->pd = pd; 68 ret = get_domain_or_subdomain(be_ctx, pd->domain, &dom); 74 ret = krb5_setup(state, pd, dom, krb5_ctx, &state->kr); 80 if (pd->cmd != SSS_PAM_ACCT_MGMT) { 99 ret = sysdb_get_user_attr(state, be_ctx->domain, state->pd->user, attrs, 103 "sysdb search for upn of user [%s] failed.\n", pd->user); 110 "No attributes for user [%s] found.\n", pd 42 krb5_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument [all...] |
H A D | krb5_auth.h | 51 struct pam_data *pd; member in struct:krb5child_req 73 struct pam_data *pd, 81 struct pam_data *pd, 97 struct pam_data *pd, 117 struct pam_data *pd, int pwd_exp_warning, 121 struct pam_data *pd, 130 struct tgt_times *tgtt, struct pam_data *pd, 137 struct pam_data *pd, 145 struct pam_data *pd,
|
H A D | krb5_auth.c | 178 struct pam_data *pd, 202 kr->pd = pd; 206 pd->user, dom->case_sensitive, &mapped_name); 218 DEBUG(SSSDBG_TRACE_ALL, "No mapping for: %s\n", pd->user); 219 kr->user = pd->user; 247 struct pam_data *pd, uid_t uid, 253 if (sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_PASSWORD) { 260 ret = sss_authtok_get_password(pd->authtok, &password, NULL); 269 ret = sysdb_cache_auth(domain, pd 177 krb5_setup(TALLOC_CTX *mem_ctx, struct pam_data *pd, struct sss_domain_info *dom, struct krb5_ctx *krb5_ctx, struct krb5child_req **_krb5_req) argument 244 krb5_auth_cache_creds(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct confdb_ctx *cdb, struct pam_data *pd, uid_t uid, int *pam_status, int *dp_err) argument 314 krb5_auth_store_creds(struct sss_domain_info *domain, struct pam_data *pd) argument 409 struct pam_data *pd; member in struct:krb5_auth_state 424 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument 787 struct pam_data *pd = state->pd; local 1157 struct pam_data *pd; member in struct:krb5_pam_handler_state 1164 krb5_pam_handler_send(TALLOC_CTX *mem_ctx, struct krb5_ctx *krb5_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
H A D | krb5_delayed_online_authentication.c | 48 struct pam_data *pd; member in struct:auth_data 69 struct pam_data *pd = auth_data->pd; local 72 DEBUG_PAM_DATA(SSSDBG_TRACE_ALL, pd); 80 keysize = keyctl_read_alloc(pd->key_serial, (void **)&password); 88 ret = sss_authtok_set_password(pd->authtok, password, keysize); 98 keyrevoke = keyctl_revoke(pd->key_serial); 107 auth_data->pd, auth_data->krb5_ctx); 133 auth_data->pd->user); 136 auth_data->pd 152 struct pam_data *pd; local 236 add_user_to_delayed_online_authentication(struct krb5_ctx *krb5_ctx, struct pam_data *pd, uid_t uid) argument [all...] |
H A D | krb5_wait_queue.c | 41 struct pam_data *pd; member in struct:queue_entry 57 qe->be_ctx, qe->pd, qe->krb5_ctx); 102 struct pam_data *pd, 122 key.str = pd->user; 142 queue_entry->pd = pd; 244 struct pam_data *pd; member in struct:krb5_auth_queue_state 255 struct pam_data *pd, 269 state->pd = pd; 100 add_to_wait_queue(struct be_ctx *be_ctx, struct tevent_req *parent_req, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument 252 krb5_auth_queue_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument [all...] |
/sssd/src/tests/cmocka/data_provider/ |
H A D | test_dp_builtin.c | 90 struct pam_data *pd; local 95 pd = talloc_zero(test_ctx, struct pam_data); 96 assert_non_null(pd); 98 req = dp_access_deny_handler_send(test_ctx, NULL, pd, test_ctx->params); 105 assert_ptr_equal(pd, out_pd); 106 assert_int_equal(pd->pam_status, PAM_PERM_DENIED); 109 talloc_free(pd); 117 struct pam_data *pd; local 122 pd = talloc_zero(test_ctx, struct pam_data); 123 assert_non_null(pd); [all...] |
/sssd/src/providers/simple/ |
H A D | simple_access_pvt.h | 33 struct pam_data *pd,
|
H A D | simple_access.c | 175 struct pam_data *pd; member in struct:simple_access_handler_state 183 struct pam_data *pd, 199 state->pd = pd; 201 pd->pam_status = PAM_SYSTEM_ERR; 202 if (pd->cmd != SSS_PAM_ACCT_MGMT) { 204 "simple access does not handle pam task %d.\n", pd->cmd); 205 pd->pam_status = PAM_MODULE_UNKNOWN; 217 pd->pam_status = PAM_PERM_DENIED; 223 subreq = simple_access_check_send(state, params->ev, simple_ctx, pd 181 simple_access_handler_send(TALLOC_CTX *mem_ctx, struct simple_ctx *simple_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |
/sssd/src/providers/proxy/ |
H A D | proxy_auth.c | 57 struct pam_data *pd) 74 state->pd = pd; 354 struct pam_data *pd, 376 child_ctx->conn, child_ctx->pd, 508 struct pam_data *pd; member in struct:proxy_conv_ctx 515 struct pam_data *pd, 531 state->pd = pd; 545 DEBUG_PAM_DATA(SSSDBG_CONF_SETTINGS, pd); 55 proxy_child_send(TALLOC_CTX *mem_ctx, struct proxy_auth_ctx *auth_ctx, struct pam_data *pd) argument 512 proxy_pam_conv_send(TALLOC_CTX *mem_ctx, struct proxy_auth_ctx *auth_ctx, struct sbus_connection *conn, struct pam_data *pd, pid_t pid) argument 651 proxy_child_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, struct pam_data **pd) argument 713 struct pam_data *pd; member in struct:proxy_pam_handler_state 721 proxy_pam_handler_send(TALLOC_CTX *mem_ctx, struct proxy_auth_ctx *proxy_auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument [all...] |