/macosx-10.9.5/Security-55471.14.18/authd/ |
H A D | process.c | 42 auth_token_t auth = (auth_token_t)value; local 45 CFIndex count = auth_token_remove_process(auth, proc); 46 if ((count == 0) && auth_token_check_state(auth, auth_token_state_registered)) { 47 server_unregister_auth_token(auth); 54 LOGD("process[%i] destroy zombies, %ld auth tokens", process_get_pid(proc), CFBagGetCount(proc->authTokens)); 56 auth_token_t auth = (auth_token_t)value; 57 LOGD("process[%i] %p, creator=%i, zombie=%i, process_cout=%ld", process_get_pid(proc), auth, auth_token_is_creator(auth, proc), auth_token_check_state(auth, auth_token_state_zombie), auth_token_get_process_count(auth)); 255 process_add_auth_token(process_t proc, auth_token_t auth) argument 266 process_remove_auth_token(process_t proc, auth_token_t auth, AuthorizationFlags flags) argument 317 __block CFTypeRef auth = NULL; local [all...] |
H A D | server.c | 49 server_queue = dispatch_queue_create("com.apple.security.auth.server", DISPATCH_QUEUE_SERIAL); 256 power_queue = dispatch_queue_create("com.apple.security.auth.power", DISPATCH_QUEUE_SERIAL); 363 server_register_auth_token(auth_token_t auth) argument 365 if (auth != NULL) { 367 LOGV("server: registering auth %p", auth); 368 CFDictionarySetValue(gAuthTokenMap, auth_token_get_key(auth), auth); 369 auth_token_set_state(auth, auth_token_state_registered); 375 server_unregister_auth_token(auth_token_t auth) argument 389 __block auth_token_t auth = NULL; local 435 auth_token_t auth = process_find_copy_auth_token(proc, blob); local 450 _server_authorize(connection_t conn, auth_token_t auth, AuthorizationFlags flags, auth_rights_t rights, auth_items_t enviroment, engine_t * engine_out) argument 496 auth_token_t auth = auth_token_create(proc, flags & kAuthorizationFlagLeastPrivileged); local 521 auth_token_t auth = NULL; local 562 auth_token_t auth = NULL; local 601 auth_token_t auth = NULL; local 634 auth_token_t auth = NULL; local 678 auth_token_t auth = NULL; local 704 auth_token_t auth = NULL; local 875 auth_token_t auth = NULL; local 954 auth_token_t auth = NULL; local 1069 auth_token_t auth = NULL; local [all...] |
/macosx-10.9.5/CPANInternal-140/SOAP-Lite-0.69/examples/UDDI/ |
H A D | syntax1.pl | 16 my $auth = get_authToken({userID => 'USERID', cred => 'CRED'})->authInfo; 27 my $newent = save_business($auth, $busent)->businessEntity;
|
/macosx-10.9.5/CPANInternal-140/SOAP-Lite-0.715/examples/UDDI/ |
H A D | syntax1.pl | 16 my $auth = get_authToken({userID => 'USERID', cred => 'CRED'})->authInfo; 27 my $newent = save_business($auth, $busent)->businessEntity;
|
/macosx-10.9.5/CPANInternal-140/SOAP-Lite_new/examples/UDDI/ |
H A D | syntax1.pl | 16 my $auth = get_authToken({userID => 'USERID', cred => 'CRED'})->authInfo; 27 my $newent = save_business($auth, $busent)->businessEntity;
|
/macosx-10.9.5/Heimdal-323.92.1/appl/kx/ |
H A D | tenletxr.in | 35 auth=$3 36 env DISPLAY=$disp XAUTHORITY=$auth $SHELL
|
H A D | common.c | 403 Xauth auth; local 412 auth.family = FamilyLocal; 413 auth.address = hostname; 414 auth.address_length = strlen(auth.address); 416 auth.number_length = strlen(tmp); 417 auth.number = tmp; 418 auth.name = COOKIE_TYPE; 419 auth.name_length = strlen(auth 576 match_local_auth(Xauth* auth, struct addrinfo *ai, const char *hostname, int disp_nr) argument 694 Xauth *auth = find_auth_cookie (f); local [all...] |
H A D | rxtelnet.in | 45 auth="" 50 auth=$3 68 ($term -title $title -n $title $xterm_args -e env DISPLAY=$disp XAUTHORITY=$auth $binary -D $telnet_args $host $port; test x"$pid" != xNO && kill -USR2 $pid) & 70 env DISPLAY=$disp XAUTHORITY=$auth $binary -D $telnet_args $host $port
|
/macosx-10.9.5/Libinfo-449.1.3/rpc.subproj/ |
H A D | rpc.h | 73 #include <rpc/auth.h> /* generic authenticator (client side) */
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/data/ |
H A D | slapd-whoami.conf | 43 by * auth 46 by anonymous auth
|
/macosx-10.9.5/OpenSSH-186/openssh/contrib/aix/ |
H A D | pam.conf | 7 sshd auth required /usr/lib/security/pam_aix 8 OTHER auth required /usr/lib/security/pam_aix
|
/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/ |
H A D | comimage.h | 87 PRIVATE void rpc__register_authn_protocol(rpc_authn_protocol_id_elt_p_t auth, int number);
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/java/CyrusSasl/ |
H A D | SaslClientFactory.java | 13 javax.security.auth.callback.CallbackHandler cbh)
|
H A D | SaslServerFactory.java | 12 javax.security.auth.callback.CallbackHandler cbh)
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/java/javax/security/auth/callback/ |
H A D | UnsupportedCallbackException.java | 1 package javax.security.auth.callback;
|
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | AuthorizationEngine.h | 88 AuthItemSet &outRights, AuthorizationToken &auth); 90 OSStatus setRule(const char *inRightName, CFDictionaryRef inRuleDefinition, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth); 91 OSStatus removeRule(const char *inRightName, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth); 95 const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth);
|
H A D | AuthorizationRule.cpp | 391 RuleImpl::setAgentHints(const AuthItemRef &inRight, const Rule &inTopLevelRule, AuthItemSet &environmentToClient, AuthorizationToken &auth) const 397 pid_t creatorPid = auth.creatorPid(); 401 audit_token_t creatorAuditToken = auth.creatorAuditToken().auditToken(); 407 if (SecStaticCodeRef clientCode = auth.creatorCode()) 456 RuleImpl::evaluateAuthentication(const AuthItemRef &inRight, const Rule &inRule,AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument 461 if (errAuthorizationSuccess == evaluateSessionOwner(inRight, inRule, environmentToClient, now, auth, hintCredential, reason)) { 478 uid_t cltUid = (cltProc.uid() != 0) ? cltProc.uid() : auth.creatorUid(); 489 RightAuthenticationLogger rightAuthLogger(auth.creatorAuditToken(), AUE_ssauthint); 493 if (auth.session().originatorUid() == auth 622 eval.run(AuthValueVector(), environmentToClient, auth); local 668 evaluateSessionOwner(const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, const CFAbsoluteTime now, const AuthorizationToken &auth, Credential &credential, SecurityAgent::Reason &reason) const argument 698 evaluateCredentialForRight(const AuthorizationToken &auth, const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, CFAbsoluteTime now, const Credential &credential, bool ignoreShared, SecurityAgent::Reason &reason) const argument 724 evaluateUserCredentialForRight(const AuthorizationToken &auth, const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, CFAbsoluteTime now, const Credential &credential, bool ignoreShared, SecurityAgent::Reason &reason) const argument 844 evaluateUser(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument 946 evaluateMechanismOnly(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationToken &auth, CredentialSet &outCredentials, bool savePassword) const argument 1039 evaluateRules(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument 1082 evaluate(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const argument [all...] |
H A D | session.cpp | 264 // if you got here, we don't care about pending operations: the auth hosts die 265 Syslog::warning("Killing auth hosts"); 337 auto_ptr<AuthorizationToken> auth(new AuthorizationToken(*this, resultCreds, auditToken, (flags&kAuthorizationFlagLeastPrivileged))); 339 SECURITYD_AUTH_CREATE(this, auth.get()); 350 &sessionCreds, &resultCreds, outRights, *auth); 351 newHandle = auth->handle(); 359 auth->mergeCredentials(resultCreds); 362 // Make sure that this isn't done until the auth(AuthorizationToken) is guaranteed to 364 Server::process().addAuthorization(auth.get()); 365 auth 372 AuthorizationToken &auth = deleter; local 393 AuthorizationToken &auth = authorization(authBlob); local 397 authGetRights(AuthorizationToken &auth, const AuthItemSet &rights, const AuthItemSet &environment, AuthorizationFlags flags, AuthItemSet &grantedRights) argument 428 AuthorizationToken &auth = authorization(authBlob); local 437 const AuthorizationToken &auth = authorization(authBlob); local 516 AuthorizationToken &auth = authorization(authBlob); local 541 AuthorizationToken &auth = authorization(authBlob); local 592 AuthorizationToken &auth = AuthorizationToken::find(blob); local [all...] |
H A D | AuthorizationEngine.cpp | 102 AuthItemSet &outRights, AuthorizationToken &auth) 144 RightAuthenticationLogger logger(auth.creatorAuditToken(), AUE_ssauthorize); 175 authCreatorName = auth.creatorPath(); 181 if (auth.creatorSandboxed() && sandbox_check(auth.creatorPid(), "authorization-right-obtain", SANDBOX_FILTER_RIGHT_NAME, (*it)->name())) { 182 Syslog::error("Sandbox denied authorizing right '%s' for authorization created by '%s' [%d]", (*it)->name(), authCreatorName.c_str(), auth.creatorPid()); 186 OSStatus result = toplevelRule->evaluate(*it, toplevelRule, environmentToClient, flags, now, inCredentials, credentials, auth, reason, authExtractPassword); 188 SECURITYD_AUTH_EVALRIGHT(&auth, (char *)(*it)->name(), result); 196 Syslog::info("Succeeded authorizing right '%s' by client '%s' [%d] for authorization created by '%s' [%d] (%X,%d)", (*it)->name(), processName.c_str(), Server::process().pid(), authCreatorName.c_str(), auth.creatorPid(), uint32_t(flags), auth 100 authorize(const AuthItemSet &inRights, const AuthItemSet &environment, AuthorizationFlags flags, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthItemSet &outRights, AuthorizationToken &auth) argument 243 verifyModification(string inRightName, bool remove, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth) argument 331 setRule(const char *inRightName, CFDictionaryRef inRuleDefinition, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth) argument 348 removeRule(const char *inRightName, const CredentialSet *inCredentials, CredentialSet *outCredentials, AuthorizationToken &auth) argument [all...] |
/macosx-10.9.5/sudo-72/src/auth/ |
H A D | aix_auth.c | 54 aixauth_verify(pw, prompt, auth) 57 sudo_auth *auth; 85 aixauth_cleanup(pw, auth) 87 sudo_auth *auth;
|
H A D | fwtk.c | 46 #include <auth.h> 53 fwtk_init(pw, auth) 55 sudo_auth *auth; 70 /* Get welcome message from auth server */ 84 fwtk_verify(pw, prompt, auth) 87 sudo_auth *auth; 151 fwtk_cleanup(pw, auth) 153 sudo_auth *auth;
|
H A D | bsdauth.c | 66 bsdauth_init(pw, auth) 68 sudo_auth *auth; 72 /* Get login class based on auth user, which may not be invoking user. */ 90 /* XXX - maybe sanity check the auth style earlier? */ 91 login_style = login_getstyle(state.lc, login_style, "auth-sudo"); 108 auth->data = (void *) &state; 113 bsdauth_verify(pw, prompt, auth) 116 sudo_auth *auth; 123 auth_session_t *as = ((struct bsdauth_state *) auth->data)->as; 181 bsdauth_cleanup(pw, auth) [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/tls/tls/tests/oldTests/ |
H A D | tlsHttp.tcl | 26 set auth [Base64_Encode "${user}:$pass"] 27 set hdrs [list Authorization [list Basic $auth]]
|
/macosx-10.9.5/webdavfs-352.92.2/mount.tproj/ |
H A D | webdav_authcache.c | 40 CFHTTPAuthenticationRef auth; member in struct:authcache_entry 102 if ( entry_ptr->auth != NULL ) 104 CFRelease(entry_ptr->auth); 105 entry_ptr->auth = NULL; 175 CFHTTPAuthenticationRef auth, 179 int *secureAuth) /* <- TRUE if auth is sent securely */ 193 method = CFHTTPAuthenticationCopyMethod(auth); 244 int CopyMountProxyCredentials(CFHTTPAuthenticationRef auth, argument 248 int *secureAuth) /* <- TRUE if auth is sent securely */ 254 if (auth 174 CopyMountCredentials( CFHTTPAuthenticationRef auth, CFStringRef *username, CFStringRef *password, CFStringRef *domain, int *secureAuth) argument [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/tsiggss/ |
H A D | clean.sh | 6 rm -f ns1/*.jnl ns1/update.txt ns1/auth.sock
|