| /sssd-io/src/shared/ |
| H A D | murmurhash3.h | 19 uint32_t murmurhash3(const char *key, int len, uint32_t seed);
|
| H A D | safealign.h | 102 * would exceed len. */ 103 #define SAFEALIGN_COPY_UINT32_CHECK(dest, src, len, pctr) do { \ 104 if ((*(pctr) + sizeof(uint32_t)) > (len) || \ 109 #define SAFEALIGN_COPY_INT32_CHECK(dest, src, len, pctr) do { \ 110 if ((*(pctr) + sizeof(int32_t)) > (len) || \ 115 #define SAFEALIGN_COPY_UINT16_CHECK(dest, src, len, pctr) do { \ 116 if ((*(pctr) + sizeof(uint16_t)) > (len) || \ 126 #define SAFEALIGN_MEMCPY_CHECK(dest, src, srclen, len, pctr) do { \ 127 if ((*(pctr) + srclen) > (len) || \ 132 #define SAFEALIGN_COPY_UINT8_CHECK(dest, src, len, pct [all...] |
| /sssd-io/src/util/ |
| H A D | user_info_msg.h | 30 size_t *len,
|
| H A D | safe-format-string.h | 71 size_t len, 75 int safe_format_string_cb (void (* callback) (void *data, const char *piece, size_t len),
|
| H A D | safe-format-string.c | 70 size_t len) 86 int len; local 102 len = strcspn (cp, "%"); 103 copy_fn (data, cp, len); 104 total += len; 105 cp += len; 193 len = strlen (value); 195 len = MIN (precision, len); 198 safe_padding (left ? 0 : width - len, 68 dummy_copy_fn(void *data, const char *piece, size_t len) argument 269 safe_format_string(char *str, size_t len, const char *format, ...) argument [all...] |
| H A D | authtok.h | 65 * @param len The length of the password string 72 const char **pwd, size_t *len); 80 * @param len The length of the string or, if 0 is passed, 87 const char *password, size_t len); 96 * @param len The length of the string 103 const char **ccfile, size_t *len); 111 * @param len The length of the string 117 const char *ccfile, size_t len); 136 * @param len The length of the data 143 const uint8_t *data, size_t len); [all...] |
| H A D | sss_utf8.h | 38 uint8_t *sss_utf8_tolower(const uint8_t *s, size_t len, size_t *nlen);
|
| H A D | sss_iobuf.c | 164 size_t len, 175 if (len > remaining) { 176 len = remaining; 179 safealign_memcpy(_buf, iobuf_ptr(iobuf), len, &iobuf->dp); 181 *_read = len; 188 size_t len, 194 ret = sss_iobuf_read(iobuf, len, _buf, &read_bytes); 199 if (read_bytes != len) { 208 size_t len) 216 ret = ensure_bytes(iobuf, len); 163 sss_iobuf_read(struct sss_iobuf *iobuf, size_t len, uint8_t *_buf, size_t *_read) argument 187 sss_iobuf_read_len(struct sss_iobuf *iobuf, size_t len, uint8_t *_buf) argument 206 sss_iobuf_write_len(struct sss_iobuf *iobuf, uint8_t *buf, size_t len) argument 221 safealign_memcpy(iobuf_ptr(iobuf), buf, len, &iobuf->dp); local 274 size_t len; local [all...] |
| H A D | authtok.c | 61 const char **pwd, size_t *len) 71 if (len) { 72 *len = tok->length - 1; 86 const char **ccfile, size_t *len) 96 if (len) { 97 *len = tok->length - 1; 113 const char *str, size_t len) 117 if (len == 0) { 118 len = strlen(str); 120 while (len > 60 sss_authtok_get_password(struct sss_auth_token *tok, const char **pwd, size_t *len) argument 85 sss_authtok_get_ccfile(struct sss_auth_token *tok, const char **ccfile, size_t *len) argument 110 sss_authtok_set_string(struct sss_auth_token *tok, enum sss_authtok_type type, const char *context_name, const char *str, size_t len) argument 166 sss_authtok_set_password(struct sss_auth_token *tok, const char *password, size_t len) argument 175 sss_authtok_set_ccfile(struct sss_auth_token *tok, const char *ccfile, size_t len) argument 187 sss_authtok_set(struct sss_auth_token *tok, enum sss_authtok_type type, const uint8_t *data, size_t len) argument 306 sss_authtok_set_2fa_from_blob(struct sss_auth_token *tok, const uint8_t *data, size_t len) argument 476 sss_authtok_set_sc_from_blob(struct sss_auth_token *tok, const uint8_t *data, size_t len) argument 525 sss_authtok_set_sc_pin(struct sss_auth_token *tok, const char *pin, size_t len) argument 539 sss_authtok_get_sc_pin(struct sss_auth_token *tok, const char **_pin, size_t *len) argument [all...] |
| H A D | mmap_cache.h | 65 #define MC_SIZE_TO_SLOTS(len) (((len) + (MC_SLOT_SIZE - 1)) / MC_SLOT_SIZE) 76 ((rec)->len >= MC_HEADER_SIZE && (rec)->len != MC_INVALID_VAL32 \ 77 && ((rec)->len <= ((mc_ctx)->dt_size \ 107 uint32_t len; /* total record length including record data */ member in struct:sss_mc_rec 145 uint32_t data_len; /* all initgroups data len */
|
| H A D | util_lock.c | 31 errno_t sss_br_lock_file(int fd, size_t start, size_t len, argument 45 lock.l_len = len;
|
| /sssd-io/src/sss_client/ |
| H A D | nss_common.h | 34 uint8_t *buf, size_t *len); 43 uint8_t *buf, size_t *len);
|
| H A D | pam_message.c | 106 int len; local 110 len = sizeof(uint32_t) + sizeof(uint32_t); 112 len += *pi->pam_user != '\0' ? 114 len += *pi->pam_service != '\0' ? 116 len += *pi->pam_tty != '\0' ? 118 len += *pi->pam_ruser != '\0' ? 120 len += *pi->pam_rhost != '\0' ? 122 len += pi->pam_authtok != NULL ? 124 len += pi->pam_newauthtok != NULL ? 126 len [all...] |
| H A D | nss_services.c | 35 size_t len; member in struct:sss_nss_getservent_data 46 sss_nss_getservent_data.len = 0; 82 uint8_t *buf, size_t *len) 95 if (*len < 11) { 108 slen = *len - (2 * sizeof(uint32_t)); 156 *len = slen - i; 174 size_t replen, len; local 199 rd.len = name_len + proto_len + 2; 200 data = malloc(sizeof(uint8_t)*rd.len); 247 len 81 sss_nss_getsvc_readrep(struct sss_nss_svc_rep *sr, uint8_t *buf, size_t *len) argument 278 size_t replen, len; local [all...] |
| H A D | nss_passwd.c | 34 size_t len; member in struct:sss_nss_getpwent_data 45 sss_nss_getpwent_data.len = 0; 68 uint8_t *buf, size_t *len) 75 if (*len < 13) { /* not enough space for data, bad packet */ 85 slen = *len - 8; 125 *len = slen - i; 136 size_t replen, len, name_len; local 171 rd.len = name_len + 1; 225 len = replen - 8; 226 ret = sss_nss_getpw_readrep(&pwrep, repbuf+8, &len); 67 sss_nss_getpw_readrep(struct sss_nss_pw_rep *pr, uint8_t *buf, size_t *len) argument 247 size_t replen, len; local [all...] |
| /sssd-io/src/responder/nss/ |
| H A D | nss_protocol_netgr.c | 41 if (host.len == 0) { 42 host.len = 1; 46 if (user.len == 0) { 47 user.len = 1; 51 if (domain.len == 0) { 52 domain.len = 1; 57 + host.len + user.len + domain.len); 66 SAFEALIGN_SET_STRING(&body[*_rp], host.str, host.len, _r [all...] |
| /sssd-io/src/lib/certmap/ |
| H A D | sss_certmap_attr_names.c | 81 size_t len; local 92 len = p - rdn; 93 if (len == 0) { 102 if (strlen(oid_attr_name_map[c].nss) != len 103 || strncmp(rdn, oid_attr_name_map[c].nss, len) != 0) {
|
| /sssd-io/src/responder/common/ |
| H A D | responder_packet.c | 57 static void sss_packet_set_len(struct sss_packet *packet, uint32_t len); 104 size_t totlen, len; local 115 len = packet_len + size; 118 if (totlen < len) { 119 int n = len / SSSSRV_PACKET_MEM_SIZE + 1; 121 if (totlen < len) { 180 size_t len; local 186 if (packet->iop > 4) len = sss_packet_get_len(packet) - packet->iop; 187 else len = packet->memsize - packet->iop; 190 if (len > packe 245 size_t len; local 309 sss_packet_set_len(struct sss_packet *packet, uint32_t len) argument 322 uint32_t len; local [all...] |
| /sssd-io/src/providers/ipa/ |
| H A D | selinux_child.c | 46 uint32_t len; local 49 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 50 DEBUG(SSSDBG_TRACE_INTERNAL, "seuser length: %d\n", len); 51 if (len == 0) { 56 if (len > size - p) return EINVAL; 57 ibuf->seuser = talloc_strndup(ibuf, (char *)(buf + p), len); 60 p += len; 64 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 65 DEBUG(SSSDBG_TRACE_INTERNAL, "mls_range length: %d\n", len); 66 if (len 203 ssize_t len = 0; local [all...] |
| /sssd-io/src/sss_client/ssh/ |
| H A D | sss_ssh_client.c | 120 uint32_t count, reserved, len, i; local 162 rd.len = req_len; 217 SAFEALIGN_COPY_UINT32(&len, rep+c, &c); 219 if (len > rep_len - c - sizeof(uint32_t)) { 225 res->name = talloc_array(res, char, len); 231 safealign_memcpy(res->name, rep+c, len, &c); 232 if (strnlen(res->name, len) != len-1) { 237 c += len; 240 SAFEALIGN_COPY_UINT32(&len, re [all...] |
| /sssd-io/src/tests/cmocka/ |
| H A D | test_sbus_opath.c | 157 size_t len; local 160 ret = sbus_opath_decompose(NULL, path, NULL, &components, &len); 162 check_opath_components_and_length(components, len, expected, expected_len); 172 size_t len; local 175 ret = sbus_opath_decompose(NULL, path, "/object/path", &components, &len); 177 check_opath_components_and_length(components, len, expected, expected_len); 187 size_t len; local 190 ret = sbus_opath_decompose(NULL, path, "/object/path/", &components, &len); 192 check_opath_components_and_length(components, len, expected, expected_len); 200 size_t len; local 213 size_t len; local [all...] |
| H A D | dummy_child.c | 39 ssize_t len; local 112 len = sss_atomic_read_s(STDIN_FILENO, buf, IN_BUF_SIZE); 113 if (len == -1) { 121 written = sss_atomic_write_s(3, buf, len); 130 if (written != len) { 132 len, written);
|
| /sssd-io/src/sss_client/nfs/ |
| H A D | sss_nfs_client.c | 67 static int reply_to_name(char *name, size_t len, uint8_t *rep, size_t rep_len); 79 size_t len = 0; local 85 sss_strnlen(name, SSS_NAME_MAX, &len); 94 rc = sss_nss_mc_getpwnam(name, len, &pwd, buf, buflen); 116 size_t len; local 122 sss_strnlen(name, SSS_NAME_MAX, &len); 131 rc = sss_nss_mc_getgrnam(name, len, &grp, buf, buflen); 146 static int get_user_from_mc(char *name, size_t len, uid_t uid) argument 171 if (pw_name_len > len) { 172 IDMAP_LOG(0, ("%s: reply too long; pw_name_len=%lu, len 187 get_group_from_mc(char *name, size_t len, id_t gid) argument 248 id_to_name(char *name, size_t len, id_t id, enum sss_cli_command cmd) argument 330 reply_to_name(char *name, size_t len, uint8_t *rep, size_t rep_len) argument 515 sss_nfs_uid_to_name(uid_t uid, char *domain, char *name, size_t len) argument 535 sss_nfs_gid_to_name(gid_t gid, char *domain, char *name, size_t len) argument [all...] |
| H A D | nfsidmap_internal.h | 50 int (*uid_to_name)(uid_t uid, char *domain, char *name, size_t len); 51 int (*gid_to_name)(gid_t gid, char *domain, char *name, size_t len);
|
| /sssd-io/src/sss_client/autofs/ |
| H A D | sss_autofs.c | 43 size_t len; member in struct:sss_getautomntent_data 90 rd.len = name_len + 1; 140 uint32_t len = 0; local 149 sss_getautomntent_data.ptr >= sss_getautomntent_data.len) { 165 SAFEALIGN_COPY_UINT32(&len, sss_getautomntent_data.data+dp, &dp); 166 if (len + sss_getautomntent_data.ptr > sss_getautomntent_data.len) { 167 /* len is bigger than the buffer */ 172 if (len == 0) { 181 if (keylen + dp > sss_getautomntent_data.len) { 359 uint32_t len; local [all...] |