Searched refs:token_name (Results 1 - 6 of 6) sorted by relevance

/sssd/src/responder/pam/
H A Dpamsrv.h72 char *token_name; member in struct:pam_auth_req
91 char **cert, char **token_name);
94 const char *token_name);
H A Dpamsrv_p11.c143 char *token_name = NULL; local
173 token_name = talloc_strndup(tmp_ctx, (char*) buf, (p - buf));
174 if (token_name == NULL) {
207 *_token_name = talloc_steal(mem_ctx, token_name);
224 char *token_name; member in struct:pam_check_cert_state
298 state->token_name = NULL;
462 &state->token_name);
489 char **cert, char **token_name)
500 if (token_name != NULL) {
501 *token_name
488 pam_check_cert_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, char **cert, char **token_name) argument
515 add_pam_cert_response(struct pam_data *pd, const char *sysdb_username, const char *token_name) argument
[all...]
H A Dpamsrv_cmd.c1373 ret = pam_check_cert_recv(req, preq, &cert, &preq->token_name);
1463 ret = add_pam_cert_response(preq->pd, cert_user, preq->token_name);
2012 preq->token_name);
/sssd/src/sss_client/
H A Dpam_message.h63 char *token_name; member in struct:pam_items
H A Dpam_sss.c163 free(pi->token_name);
164 pi->token_name = NULL;
1009 pi->token_name = strdup((char *) &buf[p + offset]);
1010 if (pi->token_name == NULL) {
1015 pi->token_name));
1112 pi->token_name = NULL;
1421 if (pi->token_name == NULL || *pi->token_name == '\0'
1426 size = sizeof(SC_PROMPT_FMT) + strlen(pi->token_name) +
1434 ret = snprintf(prompt, size, SC_PROMPT_FMT, pi->token_name, p
[all...]
/sssd/src/p11_child/
H A Dp11_child_nss.c83 const char *token_name; local
189 token_name = PK11_GetTokenName(slot);
191 token_name, slot_name, (int) slot_id, (int) module_id);
423 *token_name_out = talloc_strdup(mem_ctx, token_name);

Completed in 29 milliseconds