Searched refs:pd (Results 1 - 25 of 46) sorted by relevance

12

/sssd/src/providers/
H A Ddp_pam_data_util.c34 struct pam_data *pd = talloc_get_type(ptr, struct pam_data); local
37 sss_authtok_wipe_password(pd->authtok);
38 sss_authtok_wipe_password(pd->newauthtok);
45 struct pam_data *pd; local
47 pd = talloc_zero(mem_ctx, struct pam_data);
48 if (pd == NULL) {
53 pd->pam_status = PAM_SYSTEM_ERR;
55 pd->authtok = sss_authtok_new(pd);
56 if (pd
79 struct pam_data *pd = NULL; local
165 pam_print_data(int l, struct pam_data *pd) argument
181 pam_add_response(struct pam_data *pd, enum response_type type, int len, const uint8_t *data) argument
[all...]
H A Ddp_auth_util.c24 bool dp_pack_pam_request(DBusMessage *msg, struct pam_data *pd) argument
40 if (pd->user == NULL) return false;
41 service = pd->service ? pd->service : "";
42 tty = pd->tty ? pd->tty : "";
43 ruser = pd->ruser ? pd->ruser : "";
44 rhost = pd->rhost ? pd
80 struct pam_data pd; local
142 dp_pack_pam_response(DBusMessage *msg, struct pam_data *pd) argument
231 dp_unpack_pam_response(DBusMessage *msg, struct pam_data *pd, DBusError *dbus_error) argument
[all...]
/sssd/src/providers/data_provider/
H A Ddp_target_auth.c34 struct pam_data *pd)
40 "Sending result [%d][%s]", pd->pam_status, pd->domain);
49 dbret = dp_pack_pam_response(reply, pd);
68 struct pam_data *pd; local
72 bret = dp_unpack_pam_request(sbus_req->message, mem_ctx, &pd, &dbus_error);
78 pd->pam_status = PAM_SYSTEM_ERR;
79 if (pd->domain == NULL) {
80 pd->domain = talloc_strdup(pd, be_ct
32 dp_pam_reply(struct sbus_request *sbus_req, const char *request_name, struct pam_data *pd) argument
92 choose_target(struct data_provider *provider, struct pam_data *pd, enum dp_targets *_target, enum dp_methods *_method, const char **_req_name) argument
183 struct pam_data *pd = NULL; local
236 should_invoke_selinux(struct data_provider *provider, struct pam_data *pd) argument
253 struct pam_data *pd; local
287 struct pam_data *pd; local
[all...]
H A Ddp_builtin.c29 struct pam_data *pd; member in struct:dp_access_permit_handler_state
35 struct pam_data *pd,
48 state->pd = pd;
50 state->pd->pam_status = PAM_SUCCESS;
69 *_data = talloc_steal(mem_ctx, state->pd);
75 struct pam_data *pd; member in struct:dp_access_deny_handler_state
81 struct pam_data *pd,
94 state->pd = pd;
33 dp_access_permit_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument
79 dp_access_deny_handler_send(TALLOC_CTX *mem_ctx, void *data, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Ddp_builtin.h31 struct pam_data *pd,
42 struct pam_data *pd,
/sssd/src/providers/ldap/
H A Dldap_access.c33 struct pam_data *pd; member in struct:sdap_pam_access_handler_state
41 struct pam_data *pd,
55 state->pd = pd;
59 access_ctx->id_ctx->conn, pd);
61 pd->pam_status = PAM_SYSTEM_ERR;
91 state->pd->pam_status = PAM_SUCCESS;
94 state->pd->pam_status = PAM_ACCT_EXPIRED;
99 state->pd->pam_status = PAM_PERM_DENIED;
102 state->pd
39 sdap_pam_access_handler_send(TALLOC_CTX *mem_ctx, struct sdap_access_ctx *access_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dldap_auth.c55 static errno_t add_expired_warning(struct pam_data *pd, long exp_time) argument
65 data = talloc_array(pd, uint32_t, 2);
74 ret = pam_add_response(pd, SSS_PAM_USER_INFO, 2 * sizeof(uint32_t),
84 struct pam_data *pd,
113 if (pd != NULL &&
116 ret = add_expired_warning(pd, (long) difftime(expire_time, now));
128 struct pam_data *pd)
162 if (pd != NULL && spwd->sp_max != -1 && spwd->sp_warn != -1 &&
172 ret = add_expired_warning(pd, exp);
181 static errno_t check_pwexpire_ldap(struct pam_data *pd, argument
83 check_pwexpire_kerberos(const char *expire_date, time_t now, struct pam_data *pd, int pwd_exp_warning) argument
127 check_pwexpire_shadow(struct spwd *spwd, time_t now, struct pam_data *pd) argument
229 check_pwexpire_policy(enum pwexpire pw_expire_type, void *pw_expire_data, struct pam_data *pd, int pwd_expiration_warning) argument
907 struct pam_data *pd; member in struct:sdap_pam_auth_handler_state
914 sdap_pam_auth_handler_send(TALLOC_CTX *mem_ctx, struct sdap_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument
1078 struct pam_data *pd; member in struct:sdap_pam_chpass_handler_state
1088 sdap_pam_chpass_handler_send(TALLOC_CTX *mem_ctx, struct sdap_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dldap_auth.h42 struct pam_data *pd,
/sssd/src/responder/pam/
H A Dpam_LOCAL_domain.c63 struct pam_data *pd; local
65 pd = lreq->preq->pd;
67 if (lreq->error != EOK && pd->pam_status == PAM_SUCCESS)
68 pd->pam_status = PAM_SYSTEM_ERR;
91 lreq->preq->pd->user,
104 struct pam_data *pd; local
106 pd = lreq->preq->pd;
107 pd
144 struct pam_data *pd; local
163 struct pam_data *pd; local
229 struct pam_data *pd = preq->pd; local
[all...]
H A Dpamsrv_cmd.c86 static void inform_user(struct pam_data* pd, const char *pam_message) argument
92 ret = pack_user_info_msg(pd, pam_message, &msg_len, &msg);
97 ret = pam_add_response(pd, SSS_PAM_USER_INFO, msg_len, msg);
104 static bool is_domain_requested(struct pam_data *pd, const char *domain_name) argument
111 if (!pd->requested_domains) {
115 for (i = 0; pd->requested_domains[i]; i++) {
116 if (strcasecmp(domain_name, pd->requested_domains[i])) {
207 static int pd_set_primary_name(const struct ldb_message *msg,struct pam_data *pd) argument
217 if (strcmp(pd->user, name)) {
219 talloc_free(pd
227 pam_parse_in_data_v2(struct pam_data *pd, uint8_t *body, size_t blen) argument
330 pam_parse_in_data_v3(struct pam_data *pd, uint8_t *body, size_t blen) argument
378 pam_parse_in_data(struct pam_data *pd, uint8_t *body, size_t blen) argument
473 filter_responses_env(struct response_data *resp, struct pam_data *pd, char * const *pam_filter_opts) argument
546 filter_responses(struct confdb_ctx *cdb, struct response_data *resp_list, struct pam_data *pd) argument
695 struct pam_data *pd; local
1061 pam_forwarder_parse_data(struct cli_ctx *cctx, struct pam_data *pd) argument
1174 check_cert(TALLOC_CTX *mctx, struct tevent_context *ev, struct pam_ctx *pctx, struct pam_auth_req *preq, struct pam_data *pd) argument
1223 struct pam_data *pd; local
1367 struct pam_data *pd; local
1501 struct pam_data *pd; local
[all...]
H A Dpamsrv_dp.c64 preq->pd->pam_status = PAM_SYSTEM_ERR;
71 ret = dp_unpack_pam_response(msg, preq->pd, &dbus_error);
74 preq->pd->pam_status = PAM_SYSTEM_ERR;
78 "received: [%d (%s)][%s]\n", preq->pd->pam_status,
79 pam_strerror(NULL, preq->pd->pam_status),
80 preq->pd->domain);
84 preq->pd->pam_status = PAM_SYSTEM_ERR;
88 preq->pd->pam_status = PAM_SYSTEM_ERR;
110 struct pam_data *pd = preq->pd; local
[all...]
H A Dpamsrv.h58 struct pam_data *pd; member in struct:pam_auth_req
89 struct pam_data *pd);
93 errno_t add_pam_cert_response(struct pam_data *pd, const char *user,
96 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd);
105 struct pam_data *pd);
H A Dpamsrv_p11.c43 bool may_do_cert_auth(struct pam_ctx *pctx, struct pam_data *pd) argument
53 if (pd->cmd != SSS_PAM_PREAUTH && pd->cmd != SSS_PAM_AUTHENTICATE) {
57 if (pd->cmd == SSS_PAM_AUTHENTICATE
58 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_PIN
59 && sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_SC_KEYPAD) {
64 if (pd->service == NULL || *pd->service == '\0') {
68 if (strcmp(pd->service, sc_services[c]) == 0) {
75 pd
82 get_p11_child_write_buffer(TALLOC_CTX *mem_ctx, struct pam_data *pd, uint8_t **_buf, size_t *_len) argument
233 pam_check_cert_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, int child_debug_fd, const char *nss_db, time_t timeout, const char *verify_opts, struct pam_data *pd) argument
515 add_pam_cert_response(struct pam_data *pd, const char *sysdb_username, const char *token_name) argument
[all...]
/sssd/src/providers/ipa/
H A Dipa_auth.h34 struct pam_data *pd,
H A Dipa_auth.c175 struct pam_data *pd; member in struct:ipa_pam_auth_handler_state
187 struct pam_data *pd,
201 state->pd = pd;
206 pd->pam_status = PAM_SYSTEM_ERR;
209 pd, auth_ctx->krb5_auth_ctx);
211 pd->pam_status = PAM_SYSTEM_ERR;
238 state->pd->pam_status = PAM_SYSTEM_ERR;
239 ret = krb5_auth_queue_recv(subreq, &state->pd->pam_status, &dp_err);
241 if (ret != EOK && state->pd
185 ipa_pam_auth_handler_send(TALLOC_CTX *mem_ctx, struct ipa_auth_ctx *auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dipa_access.h51 struct pam_data *pd; member in struct:hbac_ctx
59 struct pam_data *pd,
/sssd/src/providers/krb5/
H A Dkrb5_access.c34 struct pam_data *pd; member in struct:krb5_access_state
45 struct pam_data *pd,
64 state->pd = pd;
68 ret = get_domain_or_subdomain(be_ctx, pd->domain, &dom);
74 ret = krb5_setup(state, pd, dom, krb5_ctx, &state->kr);
80 if (pd->cmd != SSS_PAM_ACCT_MGMT) {
99 ret = sysdb_get_user_attr(state, be_ctx->domain, state->pd->user, attrs,
103 "sysdb search for upn of user [%s] failed.\n", pd->user);
110 "No attributes for user [%s] found.\n", pd
42 krb5_access_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
[all...]
H A Dkrb5_auth.h51 struct pam_data *pd; member in struct:krb5child_req
73 struct pam_data *pd,
81 struct pam_data *pd,
97 struct pam_data *pd,
117 struct pam_data *pd, int pwd_exp_warning,
121 struct pam_data *pd,
130 struct tgt_times *tgtt, struct pam_data *pd,
137 struct pam_data *pd,
145 struct pam_data *pd,
H A Dkrb5_auth.c178 struct pam_data *pd,
202 kr->pd = pd;
206 pd->user, dom->case_sensitive, &mapped_name);
218 DEBUG(SSSDBG_TRACE_ALL, "No mapping for: %s\n", pd->user);
219 kr->user = pd->user;
247 struct pam_data *pd, uid_t uid,
253 if (sss_authtok_get_type(pd->authtok) != SSS_AUTHTOK_TYPE_PASSWORD) {
260 ret = sss_authtok_get_password(pd->authtok, &password, NULL);
269 ret = sysdb_cache_auth(domain, pd
177 krb5_setup(TALLOC_CTX *mem_ctx, struct pam_data *pd, struct sss_domain_info *dom, struct krb5_ctx *krb5_ctx, struct krb5child_req **_krb5_req) argument
244 krb5_auth_cache_creds(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct confdb_ctx *cdb, struct pam_data *pd, uid_t uid, int *pam_status, int *dp_err) argument
314 krb5_auth_store_creds(struct sss_domain_info *domain, struct pam_data *pd) argument
409 struct pam_data *pd; member in struct:krb5_auth_state
424 krb5_auth_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
787 struct pam_data *pd = state->pd; local
1157 struct pam_data *pd; member in struct:krb5_pam_handler_state
1164 krb5_pam_handler_send(TALLOC_CTX *mem_ctx, struct krb5_ctx *krb5_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
H A Dkrb5_delayed_online_authentication.c48 struct pam_data *pd; member in struct:auth_data
69 struct pam_data *pd = auth_data->pd; local
72 DEBUG_PAM_DATA(SSSDBG_TRACE_ALL, pd);
80 keysize = keyctl_read_alloc(pd->key_serial, (void **)&password);
88 ret = sss_authtok_set_password(pd->authtok, password, keysize);
98 keyrevoke = keyctl_revoke(pd->key_serial);
107 auth_data->pd, auth_data->krb5_ctx);
133 auth_data->pd->user);
136 auth_data->pd
152 struct pam_data *pd; local
236 add_user_to_delayed_online_authentication(struct krb5_ctx *krb5_ctx, struct pam_data *pd, uid_t uid) argument
[all...]
H A Dkrb5_wait_queue.c41 struct pam_data *pd; member in struct:queue_entry
57 qe->be_ctx, qe->pd, qe->krb5_ctx);
102 struct pam_data *pd,
122 key.str = pd->user;
142 queue_entry->pd = pd;
244 struct pam_data *pd; member in struct:krb5_auth_queue_state
255 struct pam_data *pd,
269 state->pd = pd;
100 add_to_wait_queue(struct be_ctx *be_ctx, struct tevent_req *parent_req, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
252 krb5_auth_queue_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct be_ctx *be_ctx, struct pam_data *pd, struct krb5_ctx *krb5_ctx) argument
[all...]
/sssd/src/tests/cmocka/data_provider/
H A Dtest_dp_builtin.c90 struct pam_data *pd; local
95 pd = talloc_zero(test_ctx, struct pam_data);
96 assert_non_null(pd);
98 req = dp_access_deny_handler_send(test_ctx, NULL, pd, test_ctx->params);
105 assert_ptr_equal(pd, out_pd);
106 assert_int_equal(pd->pam_status, PAM_PERM_DENIED);
109 talloc_free(pd);
117 struct pam_data *pd; local
122 pd = talloc_zero(test_ctx, struct pam_data);
123 assert_non_null(pd);
[all...]
/sssd/src/providers/simple/
H A Dsimple_access_pvt.h33 struct pam_data *pd,
H A Dsimple_access.c175 struct pam_data *pd; member in struct:simple_access_handler_state
183 struct pam_data *pd,
199 state->pd = pd;
201 pd->pam_status = PAM_SYSTEM_ERR;
202 if (pd->cmd != SSS_PAM_ACCT_MGMT) {
204 "simple access does not handle pam task %d.\n", pd->cmd);
205 pd->pam_status = PAM_MODULE_UNKNOWN;
217 pd->pam_status = PAM_PERM_DENIED;
223 subreq = simple_access_check_send(state, params->ev, simple_ctx, pd
181 simple_access_handler_send(TALLOC_CTX *mem_ctx, struct simple_ctx *simple_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]
/sssd/src/providers/proxy/
H A Dproxy_auth.c57 struct pam_data *pd)
74 state->pd = pd;
354 struct pam_data *pd,
376 child_ctx->conn, child_ctx->pd,
508 struct pam_data *pd; member in struct:proxy_conv_ctx
515 struct pam_data *pd,
531 state->pd = pd;
545 DEBUG_PAM_DATA(SSSDBG_CONF_SETTINGS, pd);
55 proxy_child_send(TALLOC_CTX *mem_ctx, struct proxy_auth_ctx *auth_ctx, struct pam_data *pd) argument
512 proxy_pam_conv_send(TALLOC_CTX *mem_ctx, struct proxy_auth_ctx *auth_ctx, struct sbus_connection *conn, struct pam_data *pd, pid_t pid) argument
651 proxy_child_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, struct pam_data **pd) argument
713 struct pam_data *pd; member in struct:proxy_pam_handler_state
721 proxy_pam_handler_send(TALLOC_CTX *mem_ctx, struct proxy_auth_ctx *proxy_auth_ctx, struct pam_data *pd, struct dp_req_params *params) argument
[all...]

Completed in 711 milliseconds

12