Searched refs:token_name (Results 1 - 6 of 6) sorted by relevance
/sssd/src/responder/pam/ |
H A D | pamsrv.h | 72 char *token_name; member in struct:pam_auth_req 91 char **cert, char **token_name); 94 const char *token_name);
|
H A D | pamsrv_p11.c | 143 char *token_name = NULL; local 173 token_name = talloc_strndup(tmp_ctx, (char*) buf, (p - buf)); 174 if (token_name == NULL) { 207 *_token_name = talloc_steal(mem_ctx, token_name); 224 char *token_name; member in struct:pam_check_cert_state 298 state->token_name = NULL; 462 &state->token_name); 489 char **cert, char **token_name) 500 if (token_name != NULL) { 501 *token_name 488 pam_check_cert_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, char **cert, char **token_name) argument 515 add_pam_cert_response(struct pam_data *pd, const char *sysdb_username, const char *token_name) argument [all...] |
H A D | pamsrv_cmd.c | 1373 ret = pam_check_cert_recv(req, preq, &cert, &preq->token_name); 1463 ret = add_pam_cert_response(preq->pd, cert_user, preq->token_name); 2012 preq->token_name);
|
/sssd/src/sss_client/ |
H A D | pam_message.h | 63 char *token_name; member in struct:pam_items
|
H A D | pam_sss.c | 163 free(pi->token_name); 164 pi->token_name = NULL; 1009 pi->token_name = strdup((char *) &buf[p + offset]); 1010 if (pi->token_name == NULL) { 1015 pi->token_name)); 1112 pi->token_name = NULL; 1421 if (pi->token_name == NULL || *pi->token_name == '\0' 1426 size = sizeof(SC_PROMPT_FMT) + strlen(pi->token_name) + 1434 ret = snprintf(prompt, size, SC_PROMPT_FMT, pi->token_name, p [all...] |
/sssd/src/p11_child/ |
H A D | p11_child_nss.c | 83 const char *token_name; local 189 token_name = PK11_GetTokenName(slot); 191 token_name, slot_name, (int) slot_id, (int) module_id); 423 *token_name_out = talloc_strdup(mem_ctx, token_name);
|
Completed in 29 milliseconds