Searched refs:auth (Results 51 - 75 of 354) sorted by relevance

1234567891011>>

/macosx-10.9.5/Security-55471.14.18/authd/
H A Dprocess.c42 auth_token_t auth = (auth_token_t)value; local
45 CFIndex count = auth_token_remove_process(auth, proc);
46 if ((count == 0) && auth_token_check_state(auth, auth_token_state_registered)) {
47 server_unregister_auth_token(auth);
54 LOGD("process[%i] destroy zombies, %ld auth tokens", process_get_pid(proc), CFBagGetCount(proc->authTokens));
56 auth_token_t auth = (auth_token_t)value;
57 LOGD("process[%i] %p, creator=%i, zombie=%i, process_cout=%ld", process_get_pid(proc), auth, auth_token_is_creator(auth, proc), auth_token_check_state(auth, auth_token_state_zombie), auth_token_get_process_count(auth));
255 process_add_auth_token(process_t proc, auth_token_t auth) argument
266 process_remove_auth_token(process_t proc, auth_token_t auth, AuthorizationFlags flags) argument
317 __block CFTypeRef auth = NULL; local
[all...]
H A Dserver.c49 server_queue = dispatch_queue_create("com.apple.security.auth.server", DISPATCH_QUEUE_SERIAL);
256 power_queue = dispatch_queue_create("com.apple.security.auth.power", DISPATCH_QUEUE_SERIAL);
363 server_register_auth_token(auth_token_t auth) argument
365 if (auth != NULL) {
367 LOGV("server: registering auth %p", auth);
368 CFDictionarySetValue(gAuthTokenMap, auth_token_get_key(auth), auth);
369 auth_token_set_state(auth, auth_token_state_registered);
375 server_unregister_auth_token(auth_token_t auth) argument
389 __block auth_token_t auth = NULL; local
435 auth_token_t auth = process_find_copy_auth_token(proc, blob); local
450 _server_authorize(connection_t conn, auth_token_t auth, AuthorizationFlags flags, auth_rights_t rights, auth_items_t enviroment, engine_t * engine_out) argument
496 auth_token_t auth = auth_token_create(proc, flags & kAuthorizationFlagLeastPrivileged); local
521 auth_token_t auth = NULL; local
562 auth_token_t auth = NULL; local
601 auth_token_t auth = NULL; local
634 auth_token_t auth = NULL; local
678 auth_token_t auth = NULL; local
704 auth_token_t auth = NULL; local
875 auth_token_t auth = NULL; local
954 auth_token_t auth = NULL; local
1069 auth_token_t auth = NULL; local
[all...]
/macosx-10.9.5/CPANInternal-140/SOAP-Lite-0.69/examples/UDDI/
H A Dsyntax1.pl16 my $auth = get_authToken({userID => 'USERID', cred => 'CRED'})->authInfo;
27 my $newent = save_business($auth, $busent)->businessEntity;
/macosx-10.9.5/CPANInternal-140/SOAP-Lite-0.715/examples/UDDI/
H A Dsyntax1.pl16 my $auth = get_authToken({userID => 'USERID', cred => 'CRED'})->authInfo;
27 my $newent = save_business($auth, $busent)->businessEntity;
/macosx-10.9.5/CPANInternal-140/SOAP-Lite_new/examples/UDDI/
H A Dsyntax1.pl16 my $auth = get_authToken({userID => 'USERID', cred => 'CRED'})->authInfo;
27 my $newent = save_business($auth, $busent)->businessEntity;
/macosx-10.9.5/Heimdal-323.92.1/appl/kx/
H A Dtenletxr.in35 auth=$3
36 env DISPLAY=$disp XAUTHORITY=$auth $SHELL
H A Dcommon.c403 Xauth auth; local
412 auth.family = FamilyLocal;
413 auth.address = hostname;
414 auth.address_length = strlen(auth.address);
416 auth.number_length = strlen(tmp);
417 auth.number = tmp;
418 auth.name = COOKIE_TYPE;
419 auth.name_length = strlen(auth
576 match_local_auth(Xauth* auth, struct addrinfo *ai, const char *hostname, int disp_nr) argument
694 Xauth *auth = find_auth_cookie (f); local
[all...]
H A Drxtelnet.in45 auth=""
50 auth=$3
68 ($term -title $title -n $title $xterm_args -e env DISPLAY=$disp XAUTHORITY=$auth $binary -D $telnet_args $host $port; test x"$pid" != xNO && kill -USR2 $pid) &
70 env DISPLAY=$disp XAUTHORITY=$auth $binary -D $telnet_args $host $port
/macosx-10.9.5/Libinfo-449.1.3/rpc.subproj/
H A Drpc.h73 #include <rpc/auth.h> /* generic authenticator (client side) */
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/data/
H A Dslapd-whoami.conf43 by * auth
46 by anonymous auth
/macosx-10.9.5/OpenSSH-186/openssh/contrib/aix/
H A Dpam.conf7 sshd auth required /usr/lib/security/pam_aix
8 OTHER auth required /usr/lib/security/pam_aix
/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/
H A Dcomimage.h87 PRIVATE void rpc__register_authn_protocol(rpc_authn_protocol_id_elt_p_t auth, int number);
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/java/CyrusSasl/
H A DSaslClientFactory.java13 javax.security.auth.callback.CallbackHandler cbh)
H A DSaslServerFactory.java12 javax.security.auth.callback.CallbackHandler cbh)
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/java/javax/security/auth/callback/
H A DUnsupportedCallbackException.java1 package javax.security.auth.callback;
/macosx-10.9.5/securityd-55199.3/src/
H A DAuthorizationEngine.h88 AuthItemSet &outRights, AuthorizationToken &auth);
90 OSStatus setRule(const char *inRightName, CFDictionaryRef inRuleDefinition, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth);
91 OSStatus removeRule(const char *inRightName, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth);
95 const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth);
H A DAuthorizationRule.cpp391 RuleImpl::setAgentHints(const AuthItemRef &inRight, const Rule &inTopLevelRule, AuthItemSet &environmentToClient, AuthorizationToken &auth) const
397 pid_t creatorPid = auth.creatorPid();
401 audit_token_t creatorAuditToken = auth.creatorAuditToken().auditToken();
407 if (SecStaticCodeRef clientCode = auth.creatorCode())
456 RuleImpl::evaluateAuthentication(const AuthItemRef &inRight, const Rule &inRule,AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument
461 if (errAuthorizationSuccess == evaluateSessionOwner(inRight, inRule, environmentToClient, now, auth, hintCredential, reason)) {
478 uid_t cltUid = (cltProc.uid() != 0) ? cltProc.uid() : auth.creatorUid();
489 RightAuthenticationLogger rightAuthLogger(auth.creatorAuditToken(), AUE_ssauthint);
493 if (auth.session().originatorUid() == auth
622 eval.run(AuthValueVector(), environmentToClient, auth); local
668 evaluateSessionOwner(const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, const CFAbsoluteTime now, const AuthorizationToken &auth, Credential &credential, SecurityAgent::Reason &reason) const argument
698 evaluateCredentialForRight(const AuthorizationToken &auth, const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, CFAbsoluteTime now, const Credential &credential, bool ignoreShared, SecurityAgent::Reason &reason) const argument
724 evaluateUserCredentialForRight(const AuthorizationToken &auth, const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, CFAbsoluteTime now, const Credential &credential, bool ignoreShared, SecurityAgent::Reason &reason) const argument
844 evaluateUser(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument
946 evaluateMechanismOnly(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationToken &auth, CredentialSet &outCredentials, bool savePassword) const argument
1039 evaluateRules(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument
1082 evaluate(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument
[all...]
H A Dsession.cpp264 // if you got here, we don't care about pending operations: the auth hosts die
265 Syslog::warning("Killing auth hosts");
337 auto_ptr<AuthorizationToken> auth(new AuthorizationToken(*this, resultCreds, auditToken, (flags&kAuthorizationFlagLeastPrivileged)));
339 SECURITYD_AUTH_CREATE(this, auth.get());
350 &sessionCreds, &resultCreds, outRights, *auth);
351 newHandle = auth->handle();
359 auth->mergeCredentials(resultCreds);
362 // Make sure that this isn't done until the auth(AuthorizationToken) is guaranteed to
364 Server::process().addAuthorization(auth.get());
365 auth
372 AuthorizationToken &auth = deleter; local
393 AuthorizationToken &auth = authorization(authBlob); local
397 authGetRights(AuthorizationToken &auth, const AuthItemSet &rights, const AuthItemSet &environment, AuthorizationFlags flags, AuthItemSet &grantedRights) argument
428 AuthorizationToken &auth = authorization(authBlob); local
437 const AuthorizationToken &auth = authorization(authBlob); local
516 AuthorizationToken &auth = authorization(authBlob); local
541 AuthorizationToken &auth = authorization(authBlob); local
592 AuthorizationToken &auth = AuthorizationToken::find(blob); local
[all...]
H A DAuthorizationEngine.cpp102 AuthItemSet &outRights, AuthorizationToken &auth)
144 RightAuthenticationLogger logger(auth.creatorAuditToken(), AUE_ssauthorize);
175 authCreatorName = auth.creatorPath();
181 if (auth.creatorSandboxed() && sandbox_check(auth.creatorPid(), "authorization-right-obtain", SANDBOX_FILTER_RIGHT_NAME, (*it)->name())) {
182 Syslog::error("Sandbox denied authorizing right '%s' for authorization created by '%s' [%d]", (*it)->name(), authCreatorName.c_str(), auth.creatorPid());
186 OSStatus result = toplevelRule->evaluate(*it, toplevelRule, environmentToClient, flags, now, inCredentials, credentials, auth, reason, authExtractPassword);
188 SECURITYD_AUTH_EVALRIGHT(&auth, (char *)(*it)->name(), result);
196 Syslog::info("Succeeded authorizing right '%s' by client '%s' [%d] for authorization created by '%s' [%d] (%X,%d)", (*it)->name(), processName.c_str(), Server::process().pid(), authCreatorName.c_str(), auth.creatorPid(), uint32_t(flags), auth
100 authorize(const AuthItemSet &inRights, const AuthItemSet &environment, AuthorizationFlags flags, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthItemSet &outRights, AuthorizationToken &auth) argument
243 verifyModification(string inRightName, bool remove, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth) argument
331 setRule(const char *inRightName, CFDictionaryRef inRuleDefinition, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth) argument
348 removeRule(const char *inRightName, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth) argument
[all...]
/macosx-10.9.5/sudo-72/src/auth/
H A Daix_auth.c54 aixauth_verify(pw, prompt, auth)
57 sudo_auth *auth;
85 aixauth_cleanup(pw, auth)
87 sudo_auth *auth;
H A Dfwtk.c46 #include <auth.h>
53 fwtk_init(pw, auth)
55 sudo_auth *auth;
70 /* Get welcome message from auth server */
84 fwtk_verify(pw, prompt, auth)
87 sudo_auth *auth;
151 fwtk_cleanup(pw, auth)
153 sudo_auth *auth;
H A Dbsdauth.c66 bsdauth_init(pw, auth)
68 sudo_auth *auth;
72 /* Get login class based on auth user, which may not be invoking user. */
90 /* XXX - maybe sanity check the auth style earlier? */
91 login_style = login_getstyle(state.lc, login_style, "auth-sudo");
108 auth->data = (void *) &state;
113 bsdauth_verify(pw, prompt, auth)
116 sudo_auth *auth;
123 auth_session_t *as = ((struct bsdauth_state *) auth->data)->as;
181 bsdauth_cleanup(pw, auth)
[all...]
/macosx-10.9.5/tcl-102/tcl_ext/tls/tls/tests/oldTests/
H A DtlsHttp.tcl26 set auth [Base64_Encode "${user}:$pass"]
27 set hdrs [list Authorization [list Basic $auth]]
/macosx-10.9.5/webdavfs-352.92.2/mount.tproj/
H A Dwebdav_authcache.c40 CFHTTPAuthenticationRef auth; member in struct:authcache_entry
102 if ( entry_ptr->auth != NULL )
104 CFRelease(entry_ptr->auth);
105 entry_ptr->auth = NULL;
175 CFHTTPAuthenticationRef auth,
179 int *secureAuth) /* <- TRUE if auth is sent securely */
193 method = CFHTTPAuthenticationCopyMethod(auth);
244 int CopyMountProxyCredentials(CFHTTPAuthenticationRef auth, argument
248 int *secureAuth) /* <- TRUE if auth is sent securely */
254 if (auth
174 CopyMountCredentials( CFHTTPAuthenticationRef auth, CFStringRef *username, CFStringRef *password, CFStringRef *domain, int *secureAuth) argument
[all...]
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/tsiggss/
H A Dclean.sh6 rm -f ns1/*.jnl ns1/update.txt ns1/auth.sock

Completed in 322 milliseconds

1234567891011>>