/sssd-io/src/util/ |
H A D | authtok-utils.h | 39 * @param[in] key_id Key ID of the certificate 55 const char *key_id, size_t key_id_len, 125 char **key_id, size_t *_key_id_len);
|
H A D | authtok-utils.c | 79 const char *key_id, size_t key_id_len, 91 || (key_id_len != 0 && key_id == NULL)) { 111 if (key_id == NULL) { 112 key_id = ""; 129 if (key_id_len == 0 || key_id[key_id_len - 1] == '\0') { 130 key_id_len = strlen(key_id); 161 memcpy(buf + c, key_id, key_id_len); 76 sss_auth_pack_sc_blob(const char *pin, size_t pin_len, const char *token_name, size_t token_name_len, const char *module_name, size_t module_name_len, const char *key_id, size_t key_id_len, uint8_t *buf, size_t buf_len, size_t *_sc_blob_len) argument
|
H A D | authtok.c | 432 const char *key_id, size_t key_id_len) 447 key_id, key_id_len, NULL, 0, 462 key_id, key_id_len, tok->data, 487 char *key_id = NULL; local 508 &key_id, &key_id_len); 517 key_id, key_id_len); 591 char **key_id, size_t *_key_id_len) 668 *key_id = talloc_strndup(mem_ctx, 673 if (*key_id == NULL) { 681 *key_id 427 sss_authtok_set_sc(struct sss_auth_token *tok, enum sss_authtok_type type, const char *pin, size_t pin_len, const char *token_name, size_t token_name_len, const char *module_name, size_t module_name_len, const char *key_id, size_t key_id_len) argument 586 sss_auth_unpack_sc_blob(TALLOC_CTX *mem_ctx, const uint8_t *blob, size_t blob_len, char **pin, size_t *_pin_len, char **token_name, size_t *_token_name_len, char **module_name, size_t *_module_name_len, char **key_id, size_t *_key_id_len) argument [all...] |
H A D | authtok.h | 286 * @param key_id A pointer to a const char *, that will point to a null 300 const char *key_id, size_t key_id_len);
|
/sssd-io/src/p11_child/ |
H A D | p11_child_nss.c | 81 SECItem *key_id = NULL; local 84 key_id = PK11_GetLowLevelKeyIDForCert(slot, cert, NULL); 85 if (key_id == NULL) { 92 key_id_str = CERT_Hexify(key_id, PR_FALSE); 93 SECITEM_FreeItem(key_id, PR_TRUE); 642 char *key_id = NULL; local 671 {"key_id", 0, POPT_ARG_STRING, &key_id, 0, 799 || key_id == NULL)) { 801 "--module_name, --token_name and --key_id mus [all...] |
/sssd-io/src/responder/pam/ |
H A D | pamsrv_p11.c | 45 char *key_id; member in struct:cert_auth_info 69 return i != NULL ? i->key_id : NULL; 429 cert_auth_info->key_id = talloc_strndup(cert_auth_info, (char *)p, 431 if (cert_auth_info->key_id == NULL) { 436 DEBUG(SSSDBG_TRACE_ALL, "Found key id [%s].\n", cert_auth_info->key_id); 564 const char *key_id = NULL; local 595 &module_name, NULL, &key_id, NULL); 609 if (key_id != NULL && *key_id != '\0') { 610 extra_args[arg_c++] = key_id; 908 const char *key_id; local [all...] |
H A D | pamsrv_cmd.c | 1154 const char *key_id; local 1206 NULL, &key_id, NULL); 1212 if (key_id == NULL || *key_id == '\0') {
|
/sssd-io/src/tests/cmocka/ |
H A D | test_authtok.c | 452 const char *key_id; local 483 &key_id, &key_id_len); 492 assert_string_equal(key_id, "mnopqr"); 497 &key_id, &key_id_len); 504 assert_string_equal(key_id, "mnopqr"); 509 &key_id, NULL); 513 assert_string_equal(key_id, "mnopqr");
|
H A D | test_pam_srv.c | 662 const char *module_name, const char *key_id, 685 key_id, 0, NULL, 0, &needed_size); 692 key_id, 0, 660 mock_input_pam_cert(TALLOC_CTX *mem_ctx, const char *name, const char *pin, const char *token_name, const char *module_name, const char *key_id, const char *service, acct_cb_t acct_cb, const char *cert, bool only_one_provider_call) argument
|
/sssd-io/src/sss_client/ |
H A D | pam_sss.c | 134 char *key_id; member in struct:cert_auth_info 146 free(cai->key_id); 922 cai->key_id = strdup((char *) &buf[*p + offset]); 923 if (cai->key_id == NULL) { 929 offset += strlen(cai->key_id) + 1; 947 cai->key_id, cai->prompt_str)); 1617 request->list.items[c].key = cai->key_id; 1638 if (strcmp(response->key, cai->key_id) == 0) { 1639 pam_info(pamh, "Certificate ā%sā selected", cai->key_id); 1731 pam_info(pamh, "Certificate ā%sā selected", cai->key_id); [all...] |
/sssd-io/src/providers/krb5/ |
H A D | krb5_child.c | 1215 const char *key_id; local 1220 &key_id, NULL); 1248 if (key_id != NULL && *key_id != '\0') { 1249 identity = talloc_asprintf_append(identity, ":certid=%s", key_id);
|