/sssd-io/src/providers/ |
H A D | dp_auth_util.c | 150 uint32_t pam_status; local 156 pam_status = pd->pam_status; 158 DBUS_TYPE_UINT32, &pam_status); 250 dbus_message_iter_get_basic(&iter, &(pd->pam_status));
|
H A D | data_provider.h | 173 int pam_status; member in struct:pam_data
|
/sssd-io/src/providers/krb5/ |
H A D | krb5_delayed_online_authentication.c | 122 int pam_status = PAM_SYSTEM_ERR; local 125 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err); 130 if (pam_status == PAM_SUCCESS) {
|
H A D | krb5_wait_queue.c | 48 int pam_status, int dp_err); 72 int pam_status; local 76 ret = krb5_auth_recv(req, &pam_status, &dp_err); 82 krb5_auth_queue_finish(parent_req, ret, pam_status, dp_err); 246 int pam_status; member in struct:krb5_auth_queue_state 314 ret = krb5_auth_recv(subreq, &state->pam_status, &state->dp_err); 336 int pam_status, 344 state->pam_status = pam_status; 365 *_pam_status = state->pam_status; 334 krb5_auth_queue_finish(struct tevent_req *req, errno_t ret, int pam_status, int dp_err) argument [all...] |
H A D | krb5_renew_tgt.c | 89 int pam_status = PAM_SYSTEM_ERR; local 93 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err); 103 switch (pam_status) {
|
H A D | krb5_auth.c | 251 int *pam_status, int *dp_err) 262 *pam_status = PAM_SYSTEM_ERR; 271 *pam_status = cached_login_pam_status(ret); 285 *pam_status = PAM_AUTHINFO_UNAVAIL; 445 int pam_status; member in struct:krb5_auth_state 480 state->pam_status = PAM_SYSTEM_ERR; 505 state->pam_status = PAM_AUTH_ERR; 516 state->pam_status = PAM_SYSTEM_ERR; 527 state->pam_status = PAM_PERM_DENIED; 540 state->pam_status 247 krb5_auth_cache_creds(struct krb5_ctx *krb5_ctx, struct sss_domain_info *domain, struct confdb_ctx *cdb, struct pam_data *pd, uid_t uid, int *pam_status, int *dp_err) argument 1193 krb5_auth_recv(struct tevent_req *req, int *pam_status, int *dp_err) argument [all...] |
/sssd-io/src/providers/proxy/ |
H A D | proxy_child.c | 182 int pam_status; local 242 pam_status = pam_authenticate(pamh, 0); 245 pam_status=pam_setcred(pamh, 0); 248 pam_status=pam_acct_mgmt(pamh, 0); 251 pam_status=pam_open_session(pamh, 0); 254 pam_status=pam_close_session(pamh, 0); 259 pam_status = pam_authenticate(pamh, 0); 261 if (pam_status != PAM_SUCCESS) break; 264 pam_status = pam_chauthtok(pamh, 0); 269 pam_status [all...] |
/sssd-io/src/tests/cmocka/ |
H A D | test_krb5_wait_queue.c | 37 int pam_status; member in struct:krb5_mocked_auth_state 66 state->pam_status = sss_mock_type(int); 108 *_pam_status = state->pam_status; 166 int pam_status, 174 will_return(krb5_auth_send, pam_status); 212 int pam_status; local 215 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err); 255 int pam_status; local 258 ret = krb5_auth_queue_recv(req, &pam_status, &dp_err); 302 int pam_status; local 162 test_krb5_wait_mock(struct test_krb5_wait_queue *test_ctx, const char *username, time_t us_delay, int ret, int pam_status, int dp_err) argument [all...] |
/sssd-io/src/sss_client/ |
H A D | pam_sss.c | 969 int32_t pam_status; local 978 memcpy(&pam_status, buf+p, sizeof(int32_t)); 1291 int pam_status = PAM_SYSTEM_ERR; local 1298 pam_status = PAM_SYSTEM_ERR; 1315 pam_status = PAM_AUTHINFO_UNAVAIL; 1322 pam_status = PAM_SYSTEM_ERR; 1326 SAFEALIGN_COPY_UINT32(&pam_status, repbuf, NULL); 1330 pam_status = ret; 1336 logger(pamh, (pam_status == PAM_SUCCESS ? LOG_INFO : LOG_NOTICE), 1339 pam_status 2087 int pam_status; local 2128 int pam_status; local 2290 int pam_status; local 2352 int pam_status; local [all...] |