Searched refs:fa2_len (Results 1 - 8 of 8) sorted by relevance

/sssd-io/src/util/
H A Dauthtok-utils.c28 const char *fa2, size_t fa2_len,
36 || fa2 == NULL || *fa2 == '\0' || fa2_len > UINT32_MAX
49 if (fa2_len == 0) {
50 fa2_len = strlen(fa2);
52 if (fa2[fa2_len] != '\0') {
57 *_2fa_blob_len = fa1_len + fa2_len + 2 + 2 * sizeof(uint32_t);
65 tmp_uint32_t = (uint32_t) fa2_len + 1;
71 memcpy(buf + c, fa2, fa2_len + 1);
27 sss_auth_pack_2fa_blob(const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len, uint8_t *buf, size_t buf_len, size_t *_2fa_blob_len) argument
H A Dauthtok-utils.h65 * @param[in] fa2_len Length of the second authentication factor, if 0
78 const char *fa2, size_t fa2_len,
H A Dauthtok.c261 uint32_t fa2_len; local
270 SAFEALIGN_COPY_UINT32(&fa2_len, blob + c, &c);
272 if (blob_len != 2 * sizeof(uint32_t) + fa1_len + fa2_len) {
287 if (fa2_len != 0) {
289 fa2_len);
314 size_t fa2_len; local
324 &fa2, &fa2_len);
330 ret = sss_authtok_set_2fa(tok, fa1, fa1_len, fa2, fa2_len);
349 const char **fa2, size_t *fa2_len)
367 *fa2_len
347 sss_authtok_get_2fa(struct sss_auth_token *tok, const char **fa1, size_t *fa1_len, const char **fa2, size_t *fa2_len) argument
387 sss_authtok_set_2fa(struct sss_auth_token *tok, const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len) argument
[all...]
H A Dauthtok.h192 * @param[in] fa2_len Length of the second authentication factor, if 0
201 const char *fa2, size_t fa2_len);
215 * @param[out] fa2_len Length of the second authentication factor
225 const char **fa2, size_t *fa2_len);
/sssd-io/src/tests/cmocka/
H A Dtest_authtok.c395 size_t fa2_len; local
428 &fa2_len);
432 assert_int_equal(fa2_len, 4);
523 assert_int_equal(fa2_len, 4); \
537 size_t fa2_len; local
554 &fa2_len);
558 &fa2_len);
562 &fa2_len);
566 &fa2_len);
/sssd-io/src/providers/krb5/
H A Dkrb5_child.c314 const char *fa2, size_t fa2_len,
335 if (ti->length > 0 && ti->length != fa2_len) {
338 "do not match.\n", ti->length, fa2_len);
352 token = talloc_strndup(mem_ctx, fa2, fa2_len);
496 size_t fa2_len; local
509 ret = sss_authtok_get_2fa(auth_tok, &pwd, &len, &fa2, &fa2_len);
515 return tokeninfo_matches_2fa(mem_ctx, ti, pwd, len, fa2, fa2_len,
311 tokeninfo_matches_2fa(TALLOC_CTX *mem_ctx, const krb5_responder_otp_tokeninfo *ti, const char *fa1, size_t fa1_len, const char *fa2, size_t fa2_len, char **out_token, char **out_pin) argument
H A Dkrb5_auth.c343 size_t fa2_len = 0; local
361 &fa2, &fa2_len);
404 sss_authtok_get_type(pd->authtok), fa2_len);
/sssd-io/src/responder/pam/
H A Dpamsrv_cmd.c659 size_t fa2_len; local
666 ret = sss_authtok_get_2fa(authtok, password, &pw_len, &fa2, &fa2_len);

Completed in 32 milliseconds