/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | authfd.h | 98 ssh_add_from_keychain(AuthenticationConnection *auth);
|
/macosx-10.9.5/Security-55471.14.18/authd/ |
H A D | agent.h | 68 agent_t agent_create(engine_t engine, mechanism_t mech, auth_token_t auth, process_t proc, bool firstMech);
|
H A D | authtoken.h | 58 mach_port_t auth_token_get_creator_bootstrap(auth_token_t auth);
|
/macosx-10.9.5/libtelnet-13/ |
H A D | krb4encpwd.c | 89 #include "auth.h" 105 #define KRB4_ENCPWD_CHALLENGE 3 /* Challenge for mutual auth. */ 110 static KTEXT_ST auth; variable 215 memmove((void *)auth.dat, (void *)data, auth.length = cnt); 220 if (r = krb_rd_encpwd_req(&auth, KRB_SERVICE_NAME, lhostname, 0, &adat, NULL, challenge, r_user, r_passwd)) {
|
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | AuthorizationMechEval.cpp | 47 AgentMechanismEvaluator::run(const AuthValueVector &inArguments, const AuthItemSet &inHints, const AuthorizationToken &auth) argument 49 AuthMechLogger logger(auth.creatorAuditToken(), AUE_ssauthmech); 64 const AuthItemSet &inContext = const_cast<AuthorizationToken &>(auth).infoSet(); 80 SECURITYD_AUTH_MECH(&auth, (char *)(*currentMechanism).c_str()); 298 AgentMechanismEvaluator::commonHints(const AuthorizationToken &auth)
|
H A D | kckey.cpp | 198 void KeychainKey::validate(AclAuthorization auth, const AccessCredentials *cred, argument 206 SecurityServerAcl::validate(auth, cred, relatedDatabase);
|
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/ |
H A D | ssl_engine_config.c.orig | 124 mctx->auth.ca_cert_path = NULL; 125 mctx->auth.ca_cert_file = NULL; 126 mctx->auth.cipher_suite = NULL; 127 mctx->auth.verify_depth = UNSET; 128 mctx->auth.verify_mode = SSL_CVERIFY_UNSET; 226 cfgMergeString(auth.ca_cert_path); 227 cfgMergeString(auth.ca_cert_file); 228 cfgMergeString(auth.cipher_suite); 229 cfgMergeInt(auth.verify_depth); 230 cfgMerge(auth [all...] |
H A D | ssl_engine_config.c | 124 mctx->auth.ca_cert_path = NULL; 125 mctx->auth.ca_cert_file = NULL; 126 mctx->auth.cipher_suite = NULL; 127 mctx->auth.verify_depth = UNSET; 128 mctx->auth.verify_mode = SSL_CVERIFY_UNSET; 227 cfgMergeString(auth.ca_cert_path); 228 cfgMergeString(auth.ca_cert_file); 229 cfgMergeString(auth.cipher_suite); 230 cfgMergeInt(auth.verify_depth); 231 cfgMerge(auth [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/rest/ |
H A D | rest.tcl | 39 set opts [parse_opts {} {} {headers: cookie: auth: format: method:} [join $args]] 62 if {[dict exists $config auth]} { 63 set auth [dict get $config auth] 64 if {[lindex $auth 0] == "basic"} { 65 lappend headers Authorization "Basic [base64::encode [lindex $auth 1]:[lindex $auth 2]]" 169 if {[dict exists $config auth]} { 170 set auth [dict get $config auth] [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | policydb.cpp | 150 SQLite::int64 auth = cached[2]; local 161 PolicyEngine::addAuthority(flags, result, label, auth, kCFBooleanTrue); 293 CFDictionary auth(CFRef<CFDictionaryRef>(makeCFDictionaryFrom(authData)), errSecCSDbCorrupt); 294 CFDictionaryRef content = auth.get<CFDictionaryRef>(CFSTR("authority")); 295 std::string authUUID = cfString(auth.get<CFStringRef>(CFSTR("uuid"))); 297 secdebug("gkupgrade", "no uuid in auth file; ignoring gke.auth"); 305 secdebug("gkupgrade", "gke.auth already present, ignoring");
|
H A D | policydb.h | 45 static const char gkeAuthFile[] = "/var/db/gke.auth"; 121 void installExplicitSet(const char *auth, const char *sigs);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | policydb.cpp | 150 SQLite::int64 auth = cached[2]; local 161 PolicyEngine::addAuthority(flags, result, label, auth, kCFBooleanTrue); 293 CFDictionary auth(CFRef<CFDictionaryRef>(makeCFDictionaryFrom(authData)), errSecCSDbCorrupt); 294 CFDictionaryRef content = auth.get<CFDictionaryRef>(CFSTR("authority")); 295 std::string authUUID = cfString(auth.get<CFStringRef>(CFSTR("uuid"))); 297 secdebug("gkupgrade", "no uuid in auth file; ignoring gke.auth"); 305 secdebug("gkupgrade", "gke.auth already present, ignoring");
|
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/Resolver/ |
H A D | Recurse.pm | 264 my %auth = (); 277 $auth{$server} ||= []; 288 # Store this CNAME into %auth too 291 if ($auth{$server}) { 295 $auth{$cname} ||= []; 296 $auth{$server} = $auth{$cname}; 303 if ($auth{$server}) { 306 push @{ $auth{$server} }, $rr->rdatastr; 314 return $self->_dorecursion( $query_packet, $of, \%auth, [all...] |
/macosx-10.9.5/CPANInternal-140/URI/URI/ |
H A D | file.pm | 73 my $auth = $other->authority; 74 return $other if !defined($scheme) && !defined($auth); # relative 76 if (!defined($auth) || 77 $auth eq "" || 78 lc($auth) eq "localhost" || 79 (defined($DEFAULT_AUTHORITY) && lc($auth) eq lc($DEFAULT_AUTHORITY)) 82 # avoid cloning if $auth already match 83 if ((defined($auth) || defined($DEFAULT_AUTHORITY)) && 84 (!defined($auth) || !defined($DEFAULT_AUTHORITY) || $auth n [all...] |
/macosx-10.9.5/Heimdal-323.92.1/tests/gss/ |
H A D | check-context.in | 141 --mutual-auth \ 150 --mutual-auth \ 311 --mutual-auth \ 321 --mutual-auth \ 413 --mutual-auth \ 422 --mutual-auth \ 438 --mutual-auth \ 485 --mutual-auth \ 504 --mutual-auth \
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | misc.c | 73 size = strlen(self->auth); 74 ssize = krb5_storage_write(sp, self->auth, size);
|
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utilities/ |
H A D | aclsubject.h | 80 AclAuthorization auth, AclValidationEnvironment *env = NULL) 82 mAuth(auth), mEnv(env), mEntryTag(NULL) { } 79 AclValidationContext(const AccessCredentials *cred, AclAuthorization auth, AclValidationEnvironment *env = NULL) argument
|
H A D | acl_preauth.h | 83 // It models a pre-auth "origin" - i.e. it points at a preauth slot and accepts 91 OriginAclSubject(AclAuthorization auth);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utilities/lib/ |
H A D | aclsubject.h | 80 AclAuthorization auth, AclValidationEnvironment *env = NULL) 82 mAuth(auth), mEnv(env), mEntryTag(NULL) { } 79 AclValidationContext(const AccessCredentials *cred, AclAuthorization auth, AclValidationEnvironment *env = NULL) argument
|
/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/ |
H A D | noauth.c | 201 static rpc_authn_protocol_id_elt_t auth[1] = { local 210 rpc__register_authn_protocol(auth, 1);
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/ |
H A D | krb-archaeology.h | 37 #define apreq_realm(auth) (auth->dat + 3)
|
/macosx-10.9.5/ruby-104/ruby/test/webrick/ |
H A D | test_httpauth.rb | 49 auth = WEBrick::HTTPAuth::BasicAuth.new( 53 auth.authenticate(req, res) 113 auth = WEBrick::HTTPAuth::DigestAuth.new( 119 auth.authenticate(req, res)
|
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/libtelnet/ |
H A D | rsaencpwd.c | 86 #include "auth.h" 106 static KTEXT_ST auth; variable 210 memmove(auth.dat, data, auth.length = cnt); 226 r = accept_rsa_encpwd(&auth, key, challenge,
|
/macosx-10.9.5/Heimdal-323.92.1/appl/telnet/telnet/ |
H A D | telnet_locl.h | 161 #include <libtelnet/auth.h>
|
/macosx-10.9.5/Libinfo-449.1.3/rpc.subproj/ |
H A D | auth_none.c | 72 #include <rpc/auth.h>
|