/dports/security/p5-Net-SAML/zxid-1.42/ |
H A D | zxidsso.c | 333 if (!cgi || !cgi->saml_art || !*cgi->saml_art) { in zxid_sp_deref_art() 334 ERR("SAMLart missing or empty string. %p %p", cgi, cgi?cgi->saml_art:0); in zxid_sp_deref_art() 335 zxlog(cf, 0, 0, 0, 0, 0, 0, 0, "N", "C", "ERR", cgi?cgi->saml_art:0, "Artifact missing"); in zxid_sp_deref_art() 340 len = strlen(cgi->saml_art); in zxid_sp_deref_art() 342 zxlog(cf, 0, 0, 0, 0, 0, 0, ZX_GET_CONTENT(ses->nameid), "N", "W", "ART", cgi->saml_art, 0); in zxid_sp_deref_art() 344 …ERR("SAMLart(%s), %d chars, too long. Max(%d) chars.", cgi->saml_art, len, (int)sizeof(buf)*4/3+6); in zxid_sp_deref_art() 345 zxlog(cf, 0, 0, 0, 0, 0, 0, 0, "N", "C", "ERR", cgi->saml_art, "Artifact too long"); in zxid_sp_deref_art() 349 p = unbase64_raw(cgi->saml_art, cgi->saml_art + len, buf, zx_std_index_64); in zxid_sp_deref_art() 369 …ERR("Unable to dereference SAMLart(%s). Can not find metadata for IdP. %p", cgi->saml_art, idp_met… in zxid_sp_deref_art() 403 body->ArtifactResolve = zxid_mk_art_deref(cf, &body->gg, idp_meta, cgi->saml_art); in zxid_sp_deref_art()
|
H A D | zxidxmltool.c | 401 D("Process artifact(%s)", cgi.saml_art); in main()
|
H A D | zxidcgi.c | 233 cgi->saml_art = v; in zxid_parse_cgi()
|
H A D | zxid.c | 528 D("Process artifact(%s)", cgi.saml_art); in main()
|
H A D | zxidsimp.c | 349 if (BBMATCH("SAML_ART", key, lim)) return cgi->saml_art; in zxid_map_bangbang() 1629 D("Process artifact(%s) pid=%d", cgi->saml_art, getpid()); in zxid_simple_no_ses_cf()
|
H A D | zxidlib.c | 307 cgi.saml_art = field; in zx_ctx_lim_get()
|
H A D | zxid.h | 432 char* saml_art; /* SAMLart=... artifact, as in artifact consumer URL. */ member
|
/dports/security/py-pysaml24/pysaml2-4.9.0/src/saml2/ |
H A D | entity.py | 1248 saml_art = create_artifact(self.config.entityid, mhd, endpoint_index) 1249 self.artifact[saml_art] = message 1250 return saml_art
|
/dports/security/py-pysaml26/pysaml2-6.5.2/src/saml2/ |
H A D | entity.py | 1565 saml_art = create_artifact(self.config.entityid, mhd, endpoint_index) 1566 self.artifact[saml_art] = message 1567 return saml_art
|
/dports/security/py-pysaml2/pysaml2-7.1.0/src/saml2/ |
H A D | entity.py | 1624 saml_art = create_artifact(self.config.entityid, mhd, endpoint_index) 1625 self.artifact[saml_art] = message 1626 return saml_art
|
/dports/www/mod_auth_mellon/mod_auth_mellon-0.18.0/ |
H A D | auth_mellon_handler.c | 2344 char *saml_art; in am_handle_artifact_reply() local 2400 saml_art = am_extract_query_parameter(r->pool, post_data, "SAMLart"); in am_handle_artifact_reply() 2401 if (saml_art == NULL) { in am_handle_artifact_reply() 2406 ap_unescape_url(saml_art); in am_handle_artifact_reply() 2408 rc = lasso_login_init_request(login, saml_art, LASSO_HTTP_METHOD_ARTIFACT_POST); in am_handle_artifact_reply()
|
/dports/security/p5-Net-SAML/zxid-1.42/php/ |
H A D | zxid_wrap.c | 21829 free(arg1->saml_art); in ZEND_NAMED_FUNCTION() 21831 arg1->saml_art = (char *) malloc(strlen((const char *)arg2)+1); in ZEND_NAMED_FUNCTION() 21832 strcpy((char *)arg1->saml_art, (const char *)arg2); in ZEND_NAMED_FUNCTION() 21834 arg1->saml_art = 0; in ZEND_NAMED_FUNCTION() 21860 result = (char *) ((arg1)->saml_art); in ZEND_NAMED_FUNCTION()
|
/dports/security/p5-Net-SAML/zxid-1.42/zxidjava/ |
H A D | zxid_wrap.c | 11609 arg1->saml_art = (char *) malloc(strlen(( char *)arg2)+1); 11610 strcpy((char *)arg1->saml_art, ( char *)arg2); 11612 arg1->saml_art = 0; 11627 result = (char *) ((arg1)->saml_art);
|
/dports/security/p5-Net-SAML/zxid-1.42/Net/ |
H A D | SAML_wrap.c | 24487 if (arg1->saml_art) free((char*)arg1->saml_art); in XS() 24490 …arg1->saml_art = (char *)(char *)memcpy((char *)malloc((size)*sizeof(char)), (const char *)(arg2),… in XS() 24492 arg1->saml_art = 0; in XS() 24523 result = (char *) ((arg1)->saml_art); in XS()
|