/sssd-io/src/util/ |
H A D | authtok-utils.h | 64 * @param[in] fa2 Second authentication factor, null terminated 78 const char *fa2, size_t fa2_len, 100 char **fa2, size_t *_fa2_len);
|
H A D | authtok-utils.c | 28 const char *fa2, size_t fa2_len, 36 || fa2 == NULL || *fa2 == '\0' || fa2_len > UINT32_MAX 50 fa2_len = strlen(fa2); 52 if (fa2[fa2_len] != '\0') { 71 memcpy(buf + c, fa2, fa2_len + 1); 27 sss_auth_pack_2fa_blob(const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len, uint8_t *buf, size_t buf_len, size_t *_2fa_blob_len) argument
|
H A D | authtok.h | 191 * @param[in] fa2 Second authentication factor, null terminated 201 const char *fa2, size_t fa2_len); 212 * @param[out] fa2 A pointer to a const char *, that will point to a 225 const char **fa2, size_t *fa2_len);
|
H A D | authtok.c | 257 char **fa2, size_t *_fa2_len) 288 *fa2 = talloc_strndup(mem_ctx, (const char *) blob + c + fa1_len, 290 if (*fa2 == NULL) { 296 *fa2 = NULL; 301 *_fa2_len = (*fa2 == NULL) ? 0 : strlen(*fa2); 313 char *fa2; local 324 &fa2, &fa2_len); 330 ret = sss_authtok_set_2fa(tok, fa1, fa1_len, fa2, fa2_len); 349 const char **fa2, size_ 254 sss_auth_unpack_2fa_blob(TALLOC_CTX *mem_ctx, const uint8_t *blob, size_t blob_len, char **fa1, size_t *_fa1_len, char **fa2, size_t *_fa2_len) argument 347 sss_authtok_get_2fa(struct sss_auth_token *tok, const char **fa1, size_t *fa1_len, const char **fa2, size_t *fa2_len) argument 387 sss_authtok_set_2fa(struct sss_auth_token *tok, const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len) argument [all...] |
/sssd-io/src/tests/cmocka/ |
H A D | test_authtok.c | 319 const char *fa2; local 356 ret = sss_authtok_get_2fa(ts->authtoken, &fa1, &fa1_size, &fa2, &fa2_size); 361 assert_string_equal(fa2, "bc"); 366 ret = sss_authtok_get_2fa(ts->authtoken, &fa1, &fa1_size, &fa2, &fa2_size); 373 ret = sss_authtok_get_2fa(ts->authtoken, &fa1, &fa1_size, &fa2, &fa2_size); 394 char *fa2; local 427 ret = sss_auth_unpack_2fa_blob(ts, buf, needed_size, &fa1, &fa1_len, &fa2, 433 assert_string_equal(fa2, "defg"); 437 talloc_free(fa2); 524 assert_string_equal(fa2, "def 536 char *fa2; local [all...] |
H A D | test_pam_srv.c | 571 const char *fa2, 594 if (fa2 != NULL) { 595 ret = sss_auth_pack_2fa_blob(pwd, 0, fa2, 0, NULL, 0, &needed_size); 601 ret = sss_auth_pack_2fa_blob(pwd, 0, fa2, 0, authtok, 655 const char *fa2) 657 return mock_input_pam_ex(mem_ctx, name, pwd, fa2, NULL, true); 568 mock_input_pam_ex(TALLOC_CTX *mem_ctx, const char *name, const char *pwd, const char *fa2, const char *svc, bool contact_dp) argument 652 mock_input_pam(TALLOC_CTX *mem_ctx, const char *name, const char *pwd, const char *fa2) argument
|
/sssd-io/src/providers/krb5/ |
H A D | krb5_child.c | 314 const char *fa2, size_t fa2_len, 352 token = talloc_strndup(mem_ctx, fa2, fa2_len); 361 token = talloc_asprintf(mem_ctx, "%s%s", fa1, fa2); 495 const char *fa2; local 509 ret = sss_authtok_get_2fa(auth_tok, &pwd, &len, &fa2, &fa2_len); 515 return tokeninfo_matches_2fa(mem_ctx, ti, pwd, len, fa2, fa2_len, 311 tokeninfo_matches_2fa(TALLOC_CTX *mem_ctx, const krb5_responder_otp_tokeninfo *ti, const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len, char **out_token, char **out_pin) argument
|
H A D | krb5_auth.c | 341 const char *fa2; local 361 &fa2, &fa2_len);
|
/sssd-io/src/responder/pam/ |
H A D | pamsrv_cmd.c | 658 const char *fa2; local 666 ret = sss_authtok_get_2fa(authtok, password, &pw_len, &fa2, &fa2_len);
|