/sssd/src/util/ |
H A D | util_sss_idmap.c | 24 void *sss_idmap_talloc(size_t size, void *pvt) argument 26 return talloc_size(pvt, size);
|
H A D | util_sss_idmap.h | 24 void *sss_idmap_talloc(size_t size, void *pvt);
|
H A D | mmap_cache.h | 37 #define MC_ALIGN32(size) ( ((size) + MC_32 -1) & (~(MC_32 -1)) ) 38 #define MC_ALIGN64(size) ( ((size) + MC_64 -1) & (~(MC_64 -1)) ) 42 #define MC_HT_ELEMS(size) ( (size) / MC_32 ) 56 * 40 seem a good compromise for slot size 95 uint32_t dt_size; /* data table size */ 96 uint32_t ft_size; /* free table size */ 97 uint32_t ht_size; /* hash table size */ [all...] |
H A D | become_user.c | 91 int size; local 103 size = getgroups(0, NULL); 104 if (size == -1) { 112 (sizeof(struct sss_creds) + size * sizeof(gid_t))); 118 ssc->num_gids = size; 120 size = getgroups(ssc->num_gids, ssc->gids); 121 if (size == -1) {
|
H A D | murmurhash3.c | 28 size_t size = sizeof(uint32_t); local 30 memcpy(&r, &p[i * size], size);
|
H A D | refcount.h | 58 void *_rc_alloc(const void *context, size_t size, size_t refcount_offset,
|
H A D | refcount.c | 47 _rc_alloc(const void *context, size_t size, size_t refcount_offset, argument 58 wrapper->ptr = talloc_named_const(NULL, size, type_name);
|
H A D | child_common.h | 43 size_t size; member in struct:response 48 size_t size; member in struct:io_buffer
|
/sssd/src/util/crypto/ |
H A D | sss_crypto.c | 25 int generate_csprng_buffer(uint8_t *buf, size_t size) argument 34 rsize = sss_atomic_read_s(fd, buf, size); 38 } else if (rsize != size) {
|
/sssd/src/responder/common/ |
H A D | responder_packet.h | 31 int sss_packet_new(TALLOC_CTX *mem_ctx, size_t size, 34 int sss_packet_grow(struct sss_packet *packet, size_t size); 35 int sss_packet_shrink(struct sss_packet *packet, size_t size); 36 int sss_packet_set_size(struct sss_packet *packet, size_t size);
|
H A D | responder_packet.c | 65 * - if size is defined use it otherwise the default packet will be 68 int sss_packet_new(TALLOC_CTX *mem_ctx, size_t size, argument 77 if (size) { 78 int n = (size + SSS_NSS_HEADER_SIZE) / SSSSRV_PACKET_MEM_SIZE; 91 sss_packet_set_len(packet, size + SSS_NSS_HEADER_SIZE); 101 /* grows a packet size only in SSSSRV_PACKET_MEM_SIZE chunks */ 102 int sss_packet_grow(struct sss_packet *packet, size_t size) argument 108 if (size == 0) { 115 len = packet_len + size; 140 packet_len += size; 149 sss_packet_shrink(struct sss_packet *packet, size_t size) argument 163 sss_packet_set_size(struct sss_packet *packet, size_t size) argument [all...] |
/sssd/src/util/crypto/nss/ |
H A D | nss_base64.c | 74 unsigned int size; local 83 b64decoded = ATOB_AsciiToData(inbuf, &size); 86 outbuf = talloc_memdup(mem_ctx, b64decoded, size); 90 *outbufsize = size;
|
/sssd/src/sss_client/ |
H A D | pam_message.c | 35 const char *tok, const size_t size, 47 c = size + sizeof(uint32_t); 55 memcpy(&buf[rp], tok, size); 56 rp += size; 83 const size_t size, uint8_t *buf) 94 c = size; 98 memcpy(&buf[rp], str, size); 99 rp += size; 104 int pack_message_v3(struct pam_items *pi, size_t *size, uint8_t **buffer) argument 175 *size 33 add_authtok_item(enum pam_item_type type, enum sss_authtok_type authtok_type, const char *tok, const size_t size, uint8_t *buf) argument 82 add_string_item(enum pam_item_type type, const char *str, const size_t size, uint8_t *buf) argument [all...] |
H A D | nss_mc_initgr.c | 39 long int *start, long int *size, 60 if ((*size - *start) < num_groups) { 64 newsize = *size + num_groups; 75 *size = newsize; 87 gid_t group, long int *start, long int *size, 104 /* Get max size of data table. */ 136 * - size of record must be lower that data table size 159 ret = sss_nss_mc_parse_result(rec, start, size, groups, limit); 38 sss_nss_mc_parse_result(struct sss_mc_rec *rec, long int *start, long int *size, gid_t **groups, long int limit) argument 86 sss_nss_mc_initgroups_dyn(const char *name, size_t name_len, gid_t group, long int *start, long int *size, gid_t **groups, long int limit) argument
|
H A D | nss_netgroup.c | 68 size_t i, slen, dlen, size; local 92 &size); 96 if (size == 0) { 107 &size); 111 if (size == 0) { 122 &size); 126 if (size == 0) {
|
H A D | pam_message.h | 66 int pack_message_v3(struct pam_items *pi, size_t *size, uint8_t **buffer);
|
/sssd/src/lib/sifp/ |
H A D | sss_sifp_utils.c | 27 void *sss_sifp_alloc_zero(sss_sifp_ctx *ctx, size_t size, size_t num) argument 29 void *addr = ctx->alloc_fn(size * num, ctx->alloc_pvt); 35 memset(addr, '\0', size * num);
|
H A D | sss_sifp_common.c | 91 unsigned int size; local 106 for (size = 0; object_paths[size] != NULL; size++); 108 domains = _alloc_zero(ctx, char *, size + 1); 115 for (i = 0; i < size; i++) {
|
/sssd/src/providers/ipa/ |
H A D | selinux_child.c | 42 size_t size, 49 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 56 if (len > size - p) return EINVAL; 64 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 72 if (len > size - p) return EINVAL; 80 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 86 if (len > size - p) return EINVAL; 103 r->size = sizeof(uint32_t); 105 r->buf = talloc_array(r, uint8_t, r->size); 131 r->size 41 unpack_buffer(uint8_t *buf, size_t size, struct input_buffer *ibuf) argument [all...] |
/sssd/src/tests/intg/ |
H A D | sssd_id.py | 58 size = POINTER(c_long)(c_long(0)) 64 res = func(c_char_p(user), c_uint32(gid), start, size, p_groups, limit, 69 gids_count = size[0]
|
/sssd/src/util/crypto/libcrypto/ |
H A D | crypto_base64.c | 76 int size, inlen = strlen(in); local 113 size = BIO_get_mem_data(bmem_out, &b64decoded); 116 outbuf = talloc_memdup(mem_ctx, b64decoded, size); 123 *outsize = size;
|
/sssd/src/providers/ldap/ |
H A D | ldap_child.c | 80 static errno_t unpack_buffer(uint8_t *buf, size_t size, argument 86 DEBUG(SSSDBG_TRACE_LIBS, "total buffer size: %zu\n", size); 88 /* realm_str size and length */ 89 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 91 DEBUG(SSSDBG_TRACE_LIBS, "realm_str size: %d\n", len); 93 if (len > size - p) return EINVAL; 100 /* princ_str size and length */ 101 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 103 DEBUG(SSSDBG_TRACE_LIBS, "princ_str size [all...] |
H A D | sdap_child_helpers.c | 162 buf->size = 6 * sizeof(uint32_t); 164 buf->size += strlen(realm_str); 167 buf->size += strlen(princ_str); 170 buf->size += strlen(keytab_name); 173 DEBUG(SSSDBG_TRACE_FUNC, "buffer size: %zu\n", buf->size); 175 buf->data = talloc_size(buf, buf->size); 222 uint8_t *buf, ssize_t size, 234 SAFEALIGN_COPY_UINT32_CHECK(&res, buf + p, size, &p); 239 /* ccache name size */ 221 parse_child_response(TALLOC_CTX *mem_ctx, uint8_t *buf, ssize_t size, int *result, krb5_error_code *kerr, char **ccache, time_t *expire_time_out) argument [all...] |
/sssd/src/providers/ad/ |
H A D | ad_gpo_child.c | 54 size_t size, 62 SAFEALIGN_COPY_UINT32_CHECK(&cached_gpt_version, buf + p, size, &p); 67 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 72 if (len > size - p) return EINVAL; 80 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 85 if (len > size - p) return EINVAL; 93 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 98 if (len > size - p) return EINVAL; 106 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 111 if (len > size 53 unpack_buffer(uint8_t *buf, size_t size, struct input_buffer *ibuf) argument [all...] |
/sssd/src/providers/krb5/ |
H A D | krb5_utils.c | 501 size_t size) 506 for (i = 0; i < size; i++) { 529 int size; local 543 size = 0; 546 &map, &size); 555 size + 1); 561 name_to_primary[size].id_name = NULL; 562 name_to_primary[size].krb_primary = NULL; 564 if (size > 0) { 566 size); 499 fill_name_to_primary_map(TALLOC_CTX *mem_ctx, char **map, struct map_id_name_to_krb_primary *name_to_primary, size_t size) argument [all...] |