Searched refs:fa2_len (Results 1 - 8 of 8) sorted by relevance
/sssd-io/src/util/ |
H A D | authtok-utils.c | 28 const char *fa2, size_t fa2_len, 36 || fa2 == NULL || *fa2 == '\0' || fa2_len > UINT32_MAX 49 if (fa2_len == 0) { 50 fa2_len = strlen(fa2); 52 if (fa2[fa2_len] != '\0') { 57 *_2fa_blob_len = fa1_len + fa2_len + 2 + 2 * sizeof(uint32_t); 65 tmp_uint32_t = (uint32_t) fa2_len + 1; 71 memcpy(buf + c, fa2, fa2_len + 1); 27 sss_auth_pack_2fa_blob(const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len, uint8_t *buf, size_t buf_len, size_t *_2fa_blob_len) argument
|
H A D | authtok-utils.h | 65 * @param[in] fa2_len Length of the second authentication factor, if 0 78 const char *fa2, size_t fa2_len,
|
H A D | authtok.c | 261 uint32_t fa2_len; local 270 SAFEALIGN_COPY_UINT32(&fa2_len, blob + c, &c); 272 if (blob_len != 2 * sizeof(uint32_t) + fa1_len + fa2_len) { 287 if (fa2_len != 0) { 289 fa2_len); 314 size_t fa2_len; local 324 &fa2, &fa2_len); 330 ret = sss_authtok_set_2fa(tok, fa1, fa1_len, fa2, fa2_len); 349 const char **fa2, size_t *fa2_len) 367 *fa2_len 347 sss_authtok_get_2fa(struct sss_auth_token *tok, const char **fa1, size_t *fa1_len, const char **fa2, size_t *fa2_len) argument 387 sss_authtok_set_2fa(struct sss_auth_token *tok, const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len) argument [all...] |
H A D | authtok.h | 192 * @param[in] fa2_len Length of the second authentication factor, if 0 201 const char *fa2, size_t fa2_len); 215 * @param[out] fa2_len Length of the second authentication factor 225 const char **fa2, size_t *fa2_len);
|
/sssd-io/src/tests/cmocka/ |
H A D | test_authtok.c | 395 size_t fa2_len; local 428 &fa2_len); 432 assert_int_equal(fa2_len, 4); 523 assert_int_equal(fa2_len, 4); \ 537 size_t fa2_len; local 554 &fa2_len); 558 &fa2_len); 562 &fa2_len); 566 &fa2_len);
|
/sssd-io/src/providers/krb5/ |
H A D | krb5_child.c | 314 const char *fa2, size_t fa2_len, 335 if (ti->length > 0 && ti->length != fa2_len) { 338 "do not match.\n", ti->length, fa2_len); 352 token = talloc_strndup(mem_ctx, fa2, fa2_len); 496 size_t fa2_len; local 509 ret = sss_authtok_get_2fa(auth_tok, &pwd, &len, &fa2, &fa2_len); 515 return tokeninfo_matches_2fa(mem_ctx, ti, pwd, len, fa2, fa2_len, 311 tokeninfo_matches_2fa(TALLOC_CTX *mem_ctx, const krb5_responder_otp_tokeninfo *ti, const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len, char **out_token, char **out_pin) argument
|
H A D | krb5_auth.c | 343 size_t fa2_len = 0; local 361 &fa2, &fa2_len); 404 sss_authtok_get_type(pd->authtok), fa2_len);
|
/sssd-io/src/responder/pam/ |
H A D | pamsrv_cmd.c | 659 size_t fa2_len; local 666 ret = sss_authtok_get_2fa(authtok, password, &pw_len, &fa2, &fa2_len);
|
Completed in 43 milliseconds