Searched refs:len (Results 1 - 25 of 122) sorted by relevance

12345

/sssd/src/util/
H A Dmurmurhash3.h18 uint32_t murmurhash3(const char *key, int len, uint32_t seed);
H A Duser_info_msg.h30 size_t *len,
H A Dsafe-format-string.h71 size_t len,
75 int safe_format_string_cb (void (* callback) (void *data, const char *piece, size_t len),
H A Dsafe-format-string.c70 size_t len)
86 int len; local
102 len = strcspn (cp, "%");
103 copy_fn (data, cp, len);
104 total += len;
105 cp += len;
193 len = strlen (value);
195 len = MIN (precision, len);
198 safe_padding (left ? 0 : width - len,
68 dummy_copy_fn(void *data, const char *piece, size_t len) argument
269 safe_format_string(char *str, size_t len, const char *format, ...) argument
[all...]
H A Dauthtok.h65 * @param len The length of the password string
72 const char **pwd, size_t *len);
80 * @param len The length of the string or, if 0 is passed,
87 const char *password, size_t len);
96 * @param len The length of the string
103 const char **ccfile, size_t *len);
111 * @param len The length of the string
117 const char *ccfile, size_t len);
136 * @param len The length of the data
143 const uint8_t *data, size_t len);
[all...]
H A Dauthtok.c61 const char **pwd, size_t *len)
71 if (len) {
72 *len = tok->length - 1;
86 const char **ccfile, size_t *len)
96 if (len) {
97 *len = tok->length - 1;
113 const char *str, size_t len)
117 if (len == 0) {
118 len = strlen(str);
120 while (len >
60 sss_authtok_get_password(struct sss_auth_token *tok, const char **pwd, size_t *len) argument
85 sss_authtok_get_ccfile(struct sss_auth_token *tok, const char **ccfile, size_t *len) argument
110 sss_authtok_set_string(struct sss_auth_token *tok, enum sss_authtok_type type, const char *context_name, const char *str, size_t len) argument
166 sss_authtok_set_password(struct sss_auth_token *tok, const char *password, size_t len) argument
175 sss_authtok_set_ccfile(struct sss_auth_token *tok, const char *ccfile, size_t len) argument
187 sss_authtok_set(struct sss_auth_token *tok, enum sss_authtok_type type, const uint8_t *data, size_t len) argument
307 sss_authtok_set_2fa_from_blob(struct sss_auth_token *tok, const uint8_t *data, size_t len) argument
428 sss_authtok_set_sc_pin(struct sss_auth_token *tok, const char *pin, size_t len) argument
444 sss_authtok_get_sc_pin(struct sss_auth_token *tok, const char **pin, size_t *len) argument
[all...]
H A Dsss_utf8.h38 uint8_t *sss_utf8_tolower(const uint8_t *s, size_t len, size_t *nlen);
H A Dmmap_cache.h65 #define MC_SIZE_TO_SLOTS(len) (((len) + (MC_SLOT_SIZE - 1)) / MC_SLOT_SIZE)
76 ((rec)->len >= MC_HEADER_SIZE && (rec)->len != MC_INVALID_VAL32 \
77 && ((rec)->len <= ((mc_ctx)->dt_size \
107 uint32_t len; /* total record length including record data */ member in struct:sss_mc_rec
145 uint32_t data_len; /* all initgroups data len */
H A Dutil_safealign.h103 * would excceed len. */
104 #define SAFEALIGN_COPY_UINT32_CHECK(dest, src, len, pctr) do { \
105 if ((*(pctr) + sizeof(uint32_t)) > (len) || \
110 #define SAFEALIGN_COPY_INT32_CHECK(dest, src, len, pctr) do { \
111 if ((*(pctr) + sizeof(int32_t)) > (len) || \
116 #define SAFEALIGN_COPY_UINT16_CHECK(dest, src, len, pctr) do { \
117 if ((*(pctr) + sizeof(uint16_t)) > (len) || \
H A Dutil_lock.c31 errno_t sss_br_lock_file(int fd, size_t start, size_t len, argument
45 lock.l_len = len;
H A Dmurmurhash3.c52 uint32_t murmurhash3(const char *key, int len, uint32_t seed) argument
64 nblocks = len / 4;
90 switch (len & 3) {
107 h1 ^= len;
/sssd/src/sss_client/
H A Dpam_message.c106 int len; local
110 len = sizeof(uint32_t) + sizeof(uint32_t);
112 len += *pi->pam_user != '\0' ?
114 len += *pi->pam_service != '\0' ?
116 len += *pi->pam_tty != '\0' ?
118 len += *pi->pam_ruser != '\0' ?
120 len += *pi->pam_rhost != '\0' ?
122 len += pi->pam_authtok != NULL ?
124 len += pi->pam_newauthtok != NULL ?
126 len
[all...]
H A Dnss_services.c35 size_t len; member in struct:sss_nss_getservent_data
46 sss_nss_getservent_data.len = 0;
82 uint8_t *buf, size_t *len)
95 if (*len < 11) {
108 slen = *len - (2 * sizeof(uint32_t));
156 *len = slen - i;
174 size_t replen, len; local
196 rd.len = name_len + proto_len + 2;
197 data = malloc(sizeof(uint8_t)*rd.len);
244 len
81 sss_nss_getsvc_readrep(struct sss_nss_svc_rep *sr, uint8_t *buf, size_t *len) argument
275 size_t replen, len; local
[all...]
H A Dnss_passwd.c33 size_t len; member in struct:sss_nss_getpwent_data
44 sss_nss_getpwent_data.len = 0;
73 uint8_t *buf, size_t *len)
80 if (*len < 13) { /* not enough space for data, bad packet */
90 slen = *len - 8;
130 *len = slen - i;
141 size_t replen, len, name_len; local
176 rd.len = name_len + 1;
230 len = replen - 8;
231 ret = sss_nss_getpw_readrep(&pwrep, repbuf+8, &len);
72 sss_nss_getpw_readrep(struct sss_nss_pw_rep *pr, uint8_t *buf, size_t *len) argument
252 size_t replen, len; local
[all...]
/sssd/src/responder/common/
H A Dresponder_packet.c57 static void sss_packet_set_len(struct sss_packet *packet, uint32_t len);
104 size_t totlen, len; local
115 len = packet_len + size;
118 if (totlen < len) {
119 int n = len / SSSSRV_PACKET_MEM_SIZE + 1;
121 if (totlen < len) {
180 size_t len; local
184 if (packet->iop > 4) len = sss_packet_get_len(packet) - packet->iop;
185 else len = packet->memsize - packet->iop;
188 if (len > packe
226 size_t len; local
290 sss_packet_set_len(struct sss_packet *packet, uint32_t len) argument
303 uint32_t len; local
[all...]
/sssd/src/tests/cmocka/
H A Ddummy_child.c38 ssize_t len; local
108 len = sss_atomic_read_s(STDIN_FILENO, buf, IN_BUF_SIZE);
109 if (len == -1) {
117 written = sss_atomic_write_s(3, buf, len);
126 if (written != len) {
128 len, written);
H A Dtest_sbus_opath.c157 size_t len; local
160 ret = sbus_opath_decompose(NULL, path, NULL, &components, &len);
162 check_opath_components_and_length(components, len, expected, expected_len);
172 size_t len; local
175 ret = sbus_opath_decompose(NULL, path, "/object/path", &components, &len);
177 check_opath_components_and_length(components, len, expected, expected_len);
187 size_t len; local
190 ret = sbus_opath_decompose(NULL, path, "/object/path/", &components, &len);
192 check_opath_components_and_length(components, len, expected, expected_len);
200 size_t len; local
213 size_t len; local
[all...]
H A Dtest_authtok.c93 size_t len; local
105 len = strlen(data) + 1;
107 ret = sss_authtok_set(ts->authtoken, type, (const uint8_t *)data, len);
111 assert_int_equal(len, sss_authtok_get_size(ts->authtoken));
118 assert_int_equal(len - 1, ret_len);
120 ret = sss_authtok_set_password(ts->authtoken, data, len);
126 assert_int_equal(len - 1, ret_len);
135 size_t len; local
147 len = strlen(data) + 1;
149 ret = sss_authtok_set(ts->authtoken, type, (const uint8_t *)data, len);
240 size_t len; local
272 size_t len; local
512 size_t len; local
[all...]
/sssd/src/providers/ipa/
H A Dselinux_child.c46 uint32_t len; local
49 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p);
50 DEBUG(SSSDBG_TRACE_INTERNAL, "seuser length: %d\n", len);
51 if (len == 0) {
56 if (len > size - p) return EINVAL;
57 ibuf->seuser = talloc_strndup(ibuf, (char *)(buf + p), len);
60 p += len;
64 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p);
65 DEBUG(SSSDBG_TRACE_INTERNAL, "mls_range length: %d\n", len);
66 if (len
199 ssize_t len = 0; local
[all...]
/sssd/src/sss_client/ssh/
H A Dsss_ssh_client.c120 uint32_t count, reserved, len, i; local
162 rd.len = req_len;
217 SAFEALIGN_COPY_UINT32(&len, rep+c, &c);
219 if (len > rep_len - c - sizeof(uint32_t)) {
225 res->name = talloc_array(res, char, len);
231 safealign_memcpy(res->name, rep+c, len, &c);
232 if (strnlen(res->name, len) != len-1) {
237 c += len;
240 SAFEALIGN_COPY_UINT32(&len, re
[all...]
/sssd/src/sss_client/nfs/
H A Dsss_nfs_client.c61 static int reply_to_name(char *name, size_t len, uint8_t *rep, size_t rep_len);
73 size_t len = 0; local
79 sss_strnlen(name, SSS_NAME_MAX, &len);
88 rc = sss_nss_mc_getpwnam(name, len, &pwd, buf, buflen);
110 size_t len; local
116 sss_strnlen(name, SSS_NAME_MAX, &len);
125 rc = sss_nss_mc_getgrnam(name, len, &grp, buf, buflen);
140 static int get_user_from_mc(char *name, size_t len, uid_t uid) argument
165 if (pw_name_len > len) {
166 IDMAP_LOG(0, ("%s: reply too long; pw_name_len=%lu, len
181 get_group_from_mc(char *name, size_t len, id_t gid) argument
242 id_to_name(char *name, size_t len, id_t id, enum sss_cli_command cmd) argument
324 reply_to_name(char *name, size_t len, uint8_t *rep, size_t rep_len) argument
509 sss_nfs_uid_to_name(uid_t uid, char *domain, char *name, size_t len) argument
529 sss_nfs_gid_to_name(gid_t gid, char *domain, char *name, size_t len) argument
[all...]
H A Dnfsidmap_internal.h50 int (*uid_to_name)(uid_t uid, char *domain, char *name, size_t len);
51 int (*gid_to_name)(gid_t gid, char *domain, char *name, size_t len);
/sssd/src/sss_client/autofs/
H A Dsss_autofs.c43 size_t len; member in struct:sss_getautomntent_data
90 rd.len = name_len + 1;
140 uint32_t len = 0; local
149 sss_getautomntent_data.ptr >= sss_getautomntent_data.len) {
165 SAFEALIGN_COPY_UINT32(&len, sss_getautomntent_data.data+dp, &dp);
166 if (len + sss_getautomntent_data.ptr > sss_getautomntent_data.len) {
167 /* len is bigger than the buffer */
172 if (len == 0) {
181 if (keylen + dp > sss_getautomntent_data.len) {
359 uint32_t len; local
[all...]
/sssd/contrib/ci/
H A Drpm-spec-builddeps29 if len(sys.argv) != 2:
/sssd/src/sss_client/libwbclient/
H A Dwbclient_common.c134 size_t len; local
136 len = strlen(str);
137 result = (char *)wbcAllocateMemory(len+1, sizeof(char), NULL);
141 memcpy(result, str, len+1);

Completed in 2607 milliseconds

12345