/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/sasl/ |
H A D | sasl.tcl | 324 foreach {authzid authid pass} [split $clientrsp \0] break 326 set check [eval $ctx(callback) [list $context password $authid $realm]] 625 # Client initializes with authid\0authzid
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | connection.c | 344 struct berval *authid 579 slap_sasl_external( c, ssf, authid ); 1402 struct berval authid = BER_BVNULL; local 1414 rc = dnX509peerNormalize( ssl, &authid ); 1423 slap_sasl_external( c, c->c_tls_ssf, &authid ); 1424 if ( authid.bv_val ) free( authid.bv_val );
|
H A D | sasl.c | 1850 const char *authid = NULL; local 1852 sasl_getprop( ctx, SASL_AUTH_EXTERNAL, (void *)&authid ); 1853 if ( authid ) authid = ch_strdup( authid ); 1861 if ( authid ) { 1863 sasl_setprop( ctx, SASL_AUTH_EXTERNAL, authid ); 1864 ch_free( (char *)authid );
|
H A D | daemon.c | 2036 struct berval authid = BER_BVNULL; local 2193 authid.bv_val = ch_malloc( 2196 authid.bv_len = sprintf( authid.bv_val, 2200 assert( authid.bv_len <= 2298 authid.bv_val ? &authid : NULL 2301 if( authid.bv_val ) ch_free(authid.bv_val);
|
H A D | proto-slap.h | 1657 struct berval *authid ); /* asserted authenication id */
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/lib/ |
H A D | server.c | 1098 if (! conn->oparams.authid) 1116 conn->oparams.authid); 1118 conn->oparams.authid, 1494 s_conn->base.oparams.authid, s_conn->base.oparams.alen, 1814 (conn->oparams.user == NULL || conn->oparams.authid == NULL)) { 1817 "and authid"); 2298 result = _sasl_auxprop_verify_apop(conn, conn->oparams.authid, 2307 conn->oparams.authid = NULL;
|
H A D | common.c | 1002 if(! conn->oparams.authid) 1005 *((const char **)pvalue) = conn->oparams.authid;
|
H A D | client.c | 1084 if(conn->oparams.user == NULL || conn->oparams.authid == NULL) { 1086 "mech did not call canon_user for both authzid and authid");
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/nssov/ |
H A D | nssov.c | 262 char authid[sizeof("gidNumber=4294967295+uidNumber=424967295,cn=peercred,cn=external,cn=auth")]; local 273 /* Should do authid mapping too */ 274 op->o_dn.bv_len = sprintf(authid,"gidNumber=%d+uidNumber=%d,cn=peercred,cn=external,cn=auth", 276 op->o_dn.bv_val = authid;
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | scram.c | 1835 const char *authid = NULL; local 1856 if (oparams->authid == NULL) { 1857 auth_result=_plug_get_authid(params->utils, &authid, prompt_need); 1925 if (oparams->authid == NULL) { 1928 authid, 1935 authid, 2002 result = encode_saslname (oparams->authid,
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/include/ |
H A D | saslplug.h | 173 const char *authid; /* canonicalized authentication id */ member in struct:sasl_out_params 176 unsigned alen; /* length of canonicalized authid */ 307 * oparams the user, authid, ulen, alen, fields are 311 * responsible for setting user, ulen, authid, and alen in the oparams 321 * SASL_BADPROT -- invalid user/authid 575 * oparams the user, authid, ulen, alen, fields are 579 * responsible for setting user, ulen, authid, and alen in the oparams 589 * SASL_BADPROT -- invalid user/authid 601 * the "authid" (user whose credentials are used / authentication id) 603 * the "authid" i [all...] |
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | digest.c | 721 if (ireq.u.digestRequest.authid) { 723 EVP_DigestUpdate(ctx, *ireq.u.digestRequest.authid, 724 strlen(*ireq.u.digestRequest.authid));
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | ldap-int.h | 804 const char* authid, ber_len_t ssf ));
|
/macosx-10.10.1/CPANInternal-159.1/Mail-Sender-0.8.22/ |
H A D | Sender.pm | 241 $self->{'authid'} = $self->{'username'}
242 if (exists $self->{'username'} and !exists $self->{'authid'});
262 $_ = send_cmd $s, $self->{'authid'};
268 $_ = send_cmd $s, &encode_base64($self->{'authid'});
293 my $user = $self->{'authid'};
311 $_ = send_cmd $s, encode_base64("\000" . $self->{'authid'} . "\000" . $self->{'authpwd'});
330 Authen::NTLM::ntlm_user($self->{'authid'});
841 =item authid
860 If set to a true value the LOGIN authentication assumes the authid and authpwd
3001 $obj->{'authid'} [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | krb5-protos.h | 3096 const char *authid);
|
/macosx-10.10.1/emacs-93/emacs/lisp/progmodes/ |
H A D | sql.el | 1069 "attributes" "audit" "authenticated" "authid" "authorization" "auto"
|