/sssd/src/util/ |
H A D | murmurhash3.h | 18 uint32_t murmurhash3(const char *key, int len, uint32_t seed);
|
H A D | user_info_msg.h | 30 size_t *len,
|
H A D | safe-format-string.h | 71 size_t len, 75 int safe_format_string_cb (void (* callback) (void *data, const char *piece, size_t len),
|
H A D | safe-format-string.c | 70 size_t len) 86 int len; local 102 len = strcspn (cp, "%"); 103 copy_fn (data, cp, len); 104 total += len; 105 cp += len; 193 len = strlen (value); 195 len = MIN (precision, len); 198 safe_padding (left ? 0 : width - len, 68 dummy_copy_fn(void *data, const char *piece, size_t len) argument 269 safe_format_string(char *str, size_t len, const char *format, ...) argument [all...] |
H A D | authtok.h | 65 * @param len The length of the password string 72 const char **pwd, size_t *len); 80 * @param len The length of the string or, if 0 is passed, 87 const char *password, size_t len); 96 * @param len The length of the string 103 const char **ccfile, size_t *len); 111 * @param len The length of the string 117 const char *ccfile, size_t len); 136 * @param len The length of the data 143 const uint8_t *data, size_t len); [all...] |
H A D | authtok.c | 61 const char **pwd, size_t *len) 71 if (len) { 72 *len = tok->length - 1; 86 const char **ccfile, size_t *len) 96 if (len) { 97 *len = tok->length - 1; 113 const char *str, size_t len) 117 if (len == 0) { 118 len = strlen(str); 120 while (len > 60 sss_authtok_get_password(struct sss_auth_token *tok, const char **pwd, size_t *len) argument 85 sss_authtok_get_ccfile(struct sss_auth_token *tok, const char **ccfile, size_t *len) argument 110 sss_authtok_set_string(struct sss_auth_token *tok, enum sss_authtok_type type, const char *context_name, const char *str, size_t len) argument 166 sss_authtok_set_password(struct sss_auth_token *tok, const char *password, size_t len) argument 175 sss_authtok_set_ccfile(struct sss_auth_token *tok, const char *ccfile, size_t len) argument 187 sss_authtok_set(struct sss_auth_token *tok, enum sss_authtok_type type, const uint8_t *data, size_t len) argument 307 sss_authtok_set_2fa_from_blob(struct sss_auth_token *tok, const uint8_t *data, size_t len) argument 428 sss_authtok_set_sc_pin(struct sss_auth_token *tok, const char *pin, size_t len) argument 444 sss_authtok_get_sc_pin(struct sss_auth_token *tok, const char **pin, size_t *len) argument [all...] |
H A D | sss_utf8.h | 38 uint8_t *sss_utf8_tolower(const uint8_t *s, size_t len, size_t *nlen);
|
H A D | mmap_cache.h | 65 #define MC_SIZE_TO_SLOTS(len) (((len) + (MC_SLOT_SIZE - 1)) / MC_SLOT_SIZE) 76 ((rec)->len >= MC_HEADER_SIZE && (rec)->len != MC_INVALID_VAL32 \ 77 && ((rec)->len <= ((mc_ctx)->dt_size \ 107 uint32_t len; /* total record length including record data */ member in struct:sss_mc_rec 145 uint32_t data_len; /* all initgroups data len */
|
H A D | util_safealign.h | 103 * would excceed len. */ 104 #define SAFEALIGN_COPY_UINT32_CHECK(dest, src, len, pctr) do { \ 105 if ((*(pctr) + sizeof(uint32_t)) > (len) || \ 110 #define SAFEALIGN_COPY_INT32_CHECK(dest, src, len, pctr) do { \ 111 if ((*(pctr) + sizeof(int32_t)) > (len) || \ 116 #define SAFEALIGN_COPY_UINT16_CHECK(dest, src, len, pctr) do { \ 117 if ((*(pctr) + sizeof(uint16_t)) > (len) || \
|
H A D | util_lock.c | 31 errno_t sss_br_lock_file(int fd, size_t start, size_t len, argument 45 lock.l_len = len;
|
H A D | murmurhash3.c | 52 uint32_t murmurhash3(const char *key, int len, uint32_t seed) argument 64 nblocks = len / 4; 90 switch (len & 3) { 107 h1 ^= len;
|
/sssd/src/sss_client/ |
H A D | pam_message.c | 106 int len; local 110 len = sizeof(uint32_t) + sizeof(uint32_t); 112 len += *pi->pam_user != '\0' ? 114 len += *pi->pam_service != '\0' ? 116 len += *pi->pam_tty != '\0' ? 118 len += *pi->pam_ruser != '\0' ? 120 len += *pi->pam_rhost != '\0' ? 122 len += pi->pam_authtok != NULL ? 124 len += pi->pam_newauthtok != NULL ? 126 len [all...] |
H A D | nss_services.c | 35 size_t len; member in struct:sss_nss_getservent_data 46 sss_nss_getservent_data.len = 0; 82 uint8_t *buf, size_t *len) 95 if (*len < 11) { 108 slen = *len - (2 * sizeof(uint32_t)); 156 *len = slen - i; 174 size_t replen, len; local 196 rd.len = name_len + proto_len + 2; 197 data = malloc(sizeof(uint8_t)*rd.len); 244 len 81 sss_nss_getsvc_readrep(struct sss_nss_svc_rep *sr, uint8_t *buf, size_t *len) argument 275 size_t replen, len; local [all...] |
H A D | nss_passwd.c | 33 size_t len; member in struct:sss_nss_getpwent_data 44 sss_nss_getpwent_data.len = 0; 73 uint8_t *buf, size_t *len) 80 if (*len < 13) { /* not enough space for data, bad packet */ 90 slen = *len - 8; 130 *len = slen - i; 141 size_t replen, len, name_len; local 176 rd.len = name_len + 1; 230 len = replen - 8; 231 ret = sss_nss_getpw_readrep(&pwrep, repbuf+8, &len); 72 sss_nss_getpw_readrep(struct sss_nss_pw_rep *pr, uint8_t *buf, size_t *len) argument 252 size_t replen, len; local [all...] |
/sssd/src/responder/common/ |
H A D | responder_packet.c | 57 static void sss_packet_set_len(struct sss_packet *packet, uint32_t len); 104 size_t totlen, len; local 115 len = packet_len + size; 118 if (totlen < len) { 119 int n = len / SSSSRV_PACKET_MEM_SIZE + 1; 121 if (totlen < len) { 180 size_t len; local 184 if (packet->iop > 4) len = sss_packet_get_len(packet) - packet->iop; 185 else len = packet->memsize - packet->iop; 188 if (len > packe 226 size_t len; local 290 sss_packet_set_len(struct sss_packet *packet, uint32_t len) argument 303 uint32_t len; local [all...] |
/sssd/src/tests/cmocka/ |
H A D | dummy_child.c | 38 ssize_t len; local 108 len = sss_atomic_read_s(STDIN_FILENO, buf, IN_BUF_SIZE); 109 if (len == -1) { 117 written = sss_atomic_write_s(3, buf, len); 126 if (written != len) { 128 len, written);
|
H A D | test_sbus_opath.c | 157 size_t len; local 160 ret = sbus_opath_decompose(NULL, path, NULL, &components, &len); 162 check_opath_components_and_length(components, len, expected, expected_len); 172 size_t len; local 175 ret = sbus_opath_decompose(NULL, path, "/object/path", &components, &len); 177 check_opath_components_and_length(components, len, expected, expected_len); 187 size_t len; local 190 ret = sbus_opath_decompose(NULL, path, "/object/path/", &components, &len); 192 check_opath_components_and_length(components, len, expected, expected_len); 200 size_t len; local 213 size_t len; local [all...] |
H A D | test_authtok.c | 93 size_t len; local 105 len = strlen(data) + 1; 107 ret = sss_authtok_set(ts->authtoken, type, (const uint8_t *)data, len); 111 assert_int_equal(len, sss_authtok_get_size(ts->authtoken)); 118 assert_int_equal(len - 1, ret_len); 120 ret = sss_authtok_set_password(ts->authtoken, data, len); 126 assert_int_equal(len - 1, ret_len); 135 size_t len; local 147 len = strlen(data) + 1; 149 ret = sss_authtok_set(ts->authtoken, type, (const uint8_t *)data, len); 240 size_t len; local 272 size_t len; local 512 size_t len; local [all...] |
/sssd/src/providers/ipa/ |
H A D | selinux_child.c | 46 uint32_t len; local 49 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 50 DEBUG(SSSDBG_TRACE_INTERNAL, "seuser length: %d\n", len); 51 if (len == 0) { 56 if (len > size - p) return EINVAL; 57 ibuf->seuser = talloc_strndup(ibuf, (char *)(buf + p), len); 60 p += len; 64 SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); 65 DEBUG(SSSDBG_TRACE_INTERNAL, "mls_range length: %d\n", len); 66 if (len 199 ssize_t len = 0; local [all...] |
/sssd/src/sss_client/ssh/ |
H A D | sss_ssh_client.c | 120 uint32_t count, reserved, len, i; local 162 rd.len = req_len; 217 SAFEALIGN_COPY_UINT32(&len, rep+c, &c); 219 if (len > rep_len - c - sizeof(uint32_t)) { 225 res->name = talloc_array(res, char, len); 231 safealign_memcpy(res->name, rep+c, len, &c); 232 if (strnlen(res->name, len) != len-1) { 237 c += len; 240 SAFEALIGN_COPY_UINT32(&len, re [all...] |
/sssd/src/sss_client/nfs/ |
H A D | sss_nfs_client.c | 61 static int reply_to_name(char *name, size_t len, uint8_t *rep, size_t rep_len); 73 size_t len = 0; local 79 sss_strnlen(name, SSS_NAME_MAX, &len); 88 rc = sss_nss_mc_getpwnam(name, len, &pwd, buf, buflen); 110 size_t len; local 116 sss_strnlen(name, SSS_NAME_MAX, &len); 125 rc = sss_nss_mc_getgrnam(name, len, &grp, buf, buflen); 140 static int get_user_from_mc(char *name, size_t len, uid_t uid) argument 165 if (pw_name_len > len) { 166 IDMAP_LOG(0, ("%s: reply too long; pw_name_len=%lu, len 181 get_group_from_mc(char *name, size_t len, id_t gid) argument 242 id_to_name(char *name, size_t len, id_t id, enum sss_cli_command cmd) argument 324 reply_to_name(char *name, size_t len, uint8_t *rep, size_t rep_len) argument 509 sss_nfs_uid_to_name(uid_t uid, char *domain, char *name, size_t len) argument 529 sss_nfs_gid_to_name(gid_t gid, char *domain, char *name, size_t len) argument [all...] |
H A D | nfsidmap_internal.h | 50 int (*uid_to_name)(uid_t uid, char *domain, char *name, size_t len); 51 int (*gid_to_name)(gid_t gid, char *domain, char *name, size_t len);
|
/sssd/src/sss_client/autofs/ |
H A D | sss_autofs.c | 43 size_t len; member in struct:sss_getautomntent_data 90 rd.len = name_len + 1; 140 uint32_t len = 0; local 149 sss_getautomntent_data.ptr >= sss_getautomntent_data.len) { 165 SAFEALIGN_COPY_UINT32(&len, sss_getautomntent_data.data+dp, &dp); 166 if (len + sss_getautomntent_data.ptr > sss_getautomntent_data.len) { 167 /* len is bigger than the buffer */ 172 if (len == 0) { 181 if (keylen + dp > sss_getautomntent_data.len) { 359 uint32_t len; local [all...] |
/sssd/contrib/ci/ |
H A D | rpm-spec-builddeps | 29 if len(sys.argv) != 2:
|
/sssd/src/sss_client/libwbclient/ |
H A D | wbclient_common.c | 134 size_t len; local 136 len = strlen(str); 137 result = (char *)wbcAllocateMemory(len+1, sizeof(char), NULL); 141 memcpy(result, str, len+1);
|