/sssd/src/util/ |
H A D | util_sss_idmap.c | 24 void *sss_idmap_talloc(size_t size, void *pvt) argument 26 return talloc_size(pvt, size);
|
H A D | refcount.c | 47 _rc_alloc(const void *context, size_t size, size_t refcount_offset, argument 58 wrapper->ptr = talloc_named_const(NULL, size, type_name);
|
H A D | become_user.c | 91 int size; local 103 size = getgroups(0, NULL); 104 if (size == -1) { 112 (sizeof(struct sss_creds) + size * sizeof(gid_t))); 118 ssc->num_gids = size; 120 size = getgroups(ssc->num_gids, ssc->gids); 121 if (size == -1) {
|
H A D | child_common.h | 43 size_t size; member in struct:response 48 size_t size; member in struct:io_buffer
|
H A D | murmurhash3.c | 28 size_t size = sizeof(uint32_t); local 30 memcpy(&r, &p[i * size], size);
|
H A D | find_uid.c | 52 static void *hash_talloc(const size_t size, void *pvt) argument 54 return talloc_size(pvt, size);
|
/sssd/src/util/crypto/ |
H A D | sss_crypto.c | 25 int generate_csprng_buffer(uint8_t *buf, size_t size) argument 34 rsize = sss_atomic_read_s(fd, buf, size); 38 } else if (rsize != size) {
|
/sssd/src/lib/sifp/ |
H A D | sss_sifp_utils.c | 27 void *sss_sifp_alloc_zero(sss_sifp_ctx *ctx, size_t size, size_t num) argument 29 void *addr = ctx->alloc_fn(size * num, ctx->alloc_pvt); 35 memset(addr, '\0', size * num);
|
H A D | sss_sifp_common.c | 91 unsigned int size; local 106 for (size = 0; object_paths[size] != NULL; size++); 108 domains = _alloc_zero(ctx, char *, size + 1); 115 for (i = 0; i < size; i++) {
|
H A D | sss_sifp.c | 31 static void * default_alloc(size_t size, void *pvt) argument 33 return malloc(size);
|
H A D | sss_sifp_parser.c | 90 unsigned int size; local 98 size = 0; 100 size++; 103 return size;
|
/sssd/src/sss_client/ |
H A D | pam_message.c | 35 const char *tok, const size_t size, 47 c = size + sizeof(uint32_t); 55 memcpy(&buf[rp], tok, size); 56 rp += size; 83 const size_t size, uint8_t *buf) 94 c = size; 98 memcpy(&buf[rp], str, size); 99 rp += size; 104 int pack_message_v3(struct pam_items *pi, size_t *size, uint8_t **buffer) argument 175 *size 33 add_authtok_item(enum pam_item_type type, enum sss_authtok_type authtok_type, const char *tok, const size_t size, uint8_t *buf) argument 82 add_string_item(enum pam_item_type type, const char *str, const size_t size, uint8_t *buf) argument [all...] |
H A D | nss_mc_initgr.c | 39 long int *start, long int *size, 60 if ((*size - *start) < num_groups) { 64 newsize = *size + num_groups; 75 *size = newsize; 87 gid_t group, long int *start, long int *size, 104 /* Get max size of data table. */ 136 * - size of record must be lower that data table size 159 ret = sss_nss_mc_parse_result(rec, start, size, groups, limit); 38 sss_nss_mc_parse_result(struct sss_mc_rec *rec, long int *start, long int *size, gid_t **groups, long int limit) argument 86 sss_nss_mc_initgroups_dyn(const char *name, size_t name_len, gid_t group, long int *start, long int *size, gid_t **groups, long int limit) argument
|
H A D | nss_netgroup.c | 68 size_t i, slen, dlen, size; local 92 &size); 96 if (size == 0) { 107 &size); 111 if (size == 0) { 122 &size); 126 if (size == 0) {
|
/sssd/src/util/crypto/nss/ |
H A D | nss_base64.c | 74 unsigned int size; local 83 b64decoded = ATOB_AsciiToData(inbuf, &size); 86 outbuf = talloc_memdup(mem_ctx, b64decoded, size); 90 *outbufsize = size;
|
/sssd/src/util/crypto/libcrypto/ |
H A D | crypto_base64.c | 76 int size, inlen = strlen(in); local 113 size = BIO_get_mem_data(bmem_out, &b64decoded); 116 outbuf = talloc_memdup(mem_ctx, b64decoded, size); 123 *outsize = size;
|
/sssd/src/tests/ |
H A D | check_and_open-tests.c | 204 ssize_t size; local 213 size = write(fd, "abc", 3); 215 fail_unless(size == -1, "check_and_open_readonly file is not readonly");
|
H A D | files-tests.c | 89 ssize_t size; local 95 size = write(fd, "abc", 3); 96 fail_if(size == -1, "Cannot write to file\n");
|
/sssd/src/providers/ipa/ |
H A D | selinux_child.c | 42 size_t size, 49 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 56 if (len > size - p) return EINVAL; 64 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 72 if (len > size - p) return EINVAL; 80 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 86 if (len > size - p) return EINVAL; 103 r->size = sizeof(uint32_t); 105 r->buf = talloc_array(r, uint8_t, r->size); 131 r->size 41 unpack_buffer(uint8_t *buf, size_t size, struct input_buffer *ibuf) argument [all...] |
/sssd/src/providers/krb5/ |
H A D | krb5_delayed_online_authentication.c | 51 static void *hash_talloc(const size_t size, void *pvt) argument 53 return talloc_size(pvt, size);
|
H A D | krb5_utils.c | 501 size_t size) 506 for (i = 0; i < size; i++) { 529 int size; local 543 size = 0; 546 &map, &size); 555 size + 1); 561 name_to_primary[size].id_name = NULL; 562 name_to_primary[size].krb_primary = NULL; 564 if (size > 0) { 566 size); 499 fill_name_to_primary_map(TALLOC_CTX *mem_ctx, char **map, struct map_id_name_to_krb_primary *name_to_primary, size_t size) argument [all...] |
/sssd/src/providers/ad/ |
H A D | ad_gpo_ndr.c | 283 uint32_t size = 0; local 288 NDR_CHECK(ndr_pull_uint16(ndr, NDR_SCALARS, &r->size)); 294 size = ndr->offset - start_ofs; 295 if (r->size < size) { 297 "ndr_pull_security_ace: r->size %u < size %u", 298 (unsigned)r->size, size); 300 pad = r->size [all...] |
/sssd/src/tools/sssctl/ |
H A D | sssctl_sifp.c | 46 static void *sssctl_sifp_talloc(size_t size, void *pvt) argument 48 return talloc_size(pvt, size);
|
/sssd/src/util/cert/libcrypto/ |
H A D | cert.c | 65 DEBUG(SSSDBG_OP_FAILURE, "Unexpected PEM size [%ld].\n", p_size); 149 "i2d_X509 size mismatch between two calls.\n"); 180 size_t size; local 238 size = SSH_RSA_HEADER_LEN + 3 * sizeof(uint32_t) 243 buf = talloc_size(mem_ctx, size); 266 *key_size = size;
|
/sssd/src/providers/ldap/ |
H A D | sdap_child_helpers.c | 162 buf->size = 6 * sizeof(uint32_t); 164 buf->size += strlen(realm_str); 167 buf->size += strlen(princ_str); 170 buf->size += strlen(keytab_name); 173 DEBUG(SSSDBG_TRACE_FUNC, "buffer size: %zu\n", buf->size); 175 buf->data = talloc_size(buf, buf->size); 222 uint8_t *buf, ssize_t size, 234 SAFEALIGN_COPY_UINT32_CHECK(&res, buf + p, size, &p); 239 /* ccache name size */ 221 parse_child_response(TALLOC_CTX *mem_ctx, uint8_t *buf, ssize_t size, int *result, krb5_error_code *kerr, char **ccache, time_t *expire_time_out) argument [all...] |