/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/java/javax/security/ |
H A D | Makefile.am | 42 SUBDIRS = auth
|
/macosx-10.10/sudo-73/src/ |
H A D | sample.syslog.conf | 4 # uses "auth". The facility can be set via the --with-logfac configure 19 # This logs successful and failed sudo attempts to the file /var/log/auth 21 auth.debug /var/log/auth 26 auth.debug @loghost
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/java/javax/security/auth/callback/ |
H A D | Callback.java | 2 package javax.security.auth.callback;
|
H A D | CallbackHandler.java | 2 package javax.security.auth.callback;
|
/macosx-10.10/Libinfo-459/rpc.subproj/ |
H A D | auth.h | 52 * from: @(#)auth.h 1.17 88/02/08 SMI 53 * from: @(#)auth.h 2.3 88/08/07 4.0 RPCSRC 54 * $Id: auth.h,v 1.4 2004/11/25 19:41:19 emoy Exp $ 58 * auth.h, Authentication interface. 117 enum_t oa_flavor; /* flavor of auth */ 118 caddr_t oa_base; /* address of more auth stuff */ 152 * The ops and the auth handle provide the interface to the authenticators. 154 * AUTH *auth; 158 #define AUTH_NEXTVERF(auth) \ 159 ((*((auth) [all...] |
H A D | auth_unix.c | 81 #include <rpc/auth.h> 117 #define AUTH_PRIVATE(auth) ((struct audata *)auth->ah_private) 124 * Returns an auth handle with the given stuff in it. 138 register AUTH *auth; local 142 * Allocate and set up auth handle 144 auth = (AUTH *)mem_alloc(sizeof(*auth)); 146 if (auth == NULL) { 158 auth [all...] |
/macosx-10.10/Security-57031.1.35/Security/authd/ |
H A D | authtoken.c | 73 auth_token_t auth = (auth_token_t)value; local 74 LOGV("authtoken: deallocated %p", auth); 76 dispatch_barrier_sync(auth->dispatch_queue, ^{}); 78 dispatch_release(auth->dispatch_queue); 79 CFReleaseSafe(auth->session); 80 CFReleaseSafe(auth->processes); 81 CFReleaseSafe(auth->context); 82 CFReleaseSafe(auth->credentials); 83 CFReleaseSafe(auth->authorized_rights); 84 free_safe(auth 104 auth_token_t auth = (auth_token_t)value; local 112 auth_token_t auth = (auth_token_t)value; local 144 auth_token_t auth = (auth_token_t)_CFRuntimeCreateInstance(kCFAllocatorDefault, auth_token_get_type_id(), AUTH_CLASS_SIZE(auth_token), NULL); local 186 auth_token_t auth = NULL; local 221 auth_token_t auth = NULL; local 263 auth_token_get_sandboxed(auth_token_t auth) argument 269 auth_token_get_code_url(auth_token_t auth) argument 275 auth_token_get_key(auth_token_t auth) argument 281 auth_token_get_context(auth_token_t auth) argument 287 auth_token_least_privileged(auth_token_t auth) argument 293 auth_token_get_uid(auth_token_t auth) argument 299 auth_token_get_pid(auth_token_t auth) argument 305 auth_token_get_session(auth_token_t auth) argument 311 auth_token_get_blob(auth_token_t auth) argument 317 auth_token_get_audit_info(auth_token_t auth) argument 323 auth_token_get_creator_bootstrap(auth_token_t auth) argument 329 auth_token_add_process(auth_token_t auth, process_t proc) argument 340 auth_token_remove_process(auth_token_t auth, process_t proc) argument 354 auth_token_get_process_count(auth_token_t auth) argument 364 auth_token_set_credential(auth_token_t auth, credential_t cred) argument 372 auth_token_credentials_iterate(auth_token_t auth, credential_iterator_t iter) argument 393 auth_token_set_right(auth_token_t auth, credential_t right) argument 401 auth_token_rights_iterate(auth_token_t auth, credential_iterator_t iter) argument 422 auth_token_copy_entitlement_value(auth_token_t auth, const char * entitlement) argument 435 auth_token_has_entitlement(auth_token_t auth, const char * entitlement) argument 449 auth_token_has_entitlement_for_right(auth_token_t auth, const char * right) argument 463 auth_token_get_credential(auth_token_t auth) argument 475 auth_token_apple_signed(auth_token_t auth) argument 480 auth_token_is_creator(auth_token_t auth, process_t proc) argument 493 auth_token_set_state(auth_token_t auth, auth_token_state_t state) argument 498 auth_token_clear_state(auth_token_t auth, auth_token_state_t state) argument 503 auth_token_get_state(auth_token_t auth) argument 508 auth_token_check_state(auth_token_t auth, auth_token_state_t state) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | testsslproxy | 5 for auth in A B C BC; do 7 sh ./testssl $1 $2 $3 "-proxy -proxy_auth $auth -proxy_cond $cond"
|
/macosx-10.10/Heimdal-398.1.2/appl/kx/ |
H A D | writeauth.c | 60 XauWriteAuth (FILE *auth_file, Xauth *auth) argument 62 if (write_short (auth->family, auth_file) == 0) 64 if (write_counted_string (auth->address_length, auth->address, auth_file) == 0) 66 if (write_counted_string (auth->number_length, auth->number, auth_file) == 0) 68 if (write_counted_string (auth->name_length, auth->name, auth_file) == 0) 70 if (write_counted_string (auth->data_length, auth [all...] |
/macosx-10.10/sudo-73/src/auth/ |
H A D | sudo_auth.c | 93 sudo_auth *auth; local 99 /* Set FLAG_ONEANDONLY if there is only one auth method. */ 103 /* Initialize auth methods and unconfigure the method if necessary. */ 104 for (auth = auth_switch; auth->name; auth++) { 105 if (auth->init && IS_CONFIGURED(auth)) { 106 if (NEEDS_USER(auth)) 109 status = (auth 132 sudo_auth *auth; local 167 sudo_auth *auth; local 278 sudo_auth *auth; local [all...] |
H A D | sudo_auth.h | 31 int (*init) __P((struct passwd *pw, struct sudo_auth *auth)); 32 int (*setup) __P((struct passwd *pw, char **prompt, struct sudo_auth *auth)); 33 int (*verify) __P((struct passwd *pw, char *p, struct sudo_auth *auth)); 34 int (*cleanup) __P((struct passwd *pw, struct sudo_auth *auth)); 41 #define FLAG_ONEANDONLY 0x04 /* one and only auth method */ 49 int fwtk_init __P((struct passwd *pw, sudo_auth *auth)); 50 int fwtk_verify __P((struct passwd *pw, char *prompt, sudo_auth *auth)); 51 int fwtk_cleanup __P((struct passwd *pw, sudo_auth *auth)); 52 int pam_init __P((struct passwd *pw, sudo_auth *auth)); 53 int pam_verify __P((struct passwd *pw, char *prompt, sudo_auth *auth)); [all...] |
H A D | secureware.c | 56 secureware_init(pw, auth) 58 sudo_auth *auth; 67 auth->data = sudo_getepw(pw); 73 secureware_verify(pw, pass, auth) 76 sudo_auth *auth; 78 char *pw_epasswd = auth->data; 103 secureware_cleanup(pw, auth) 105 sudo_auth *auth; 107 char *pw_epasswd = auth->data;
|
H A D | securid.c | 59 securid_init(pw, auth) 61 sudo_auth *auth; 65 auth->data = (void *) &sd_dat; /* For method-specific data */ 74 securid_setup(pw, promptp, auth) 77 sudo_auth *auth; 79 struct SD_CLIENT *sd = (struct SD_CLIENT *) auth->data; 93 securid_verify(pw, pass, auth) 96 sudo_auth *auth; 98 struct SD_CLIENT *sd = (struct SD_CLIENT *) auth->data;
|
H A D | kerb5.c | 93 kerb5_setup(pw, promptp, auth) 96 sudo_auth *auth; 106 sudo_context = ((sudo_krb5_datap) auth->data)->sudo_context; 107 princ = ((sudo_krb5_datap) auth->data)->princ; 111 * API does not currently provide this unless the auth is standalone. 115 "%s: unable to unparse princ ('%s'): %s", auth->name, 132 kerb5_init(pw, auth) 134 sudo_auth *auth; 142 auth->data = (void *) &sudo_krb5_data; /* Stash all our data here */ 156 "%s: unable to parse '%s': %s", auth [all...] |
H A D | passwd.c | 53 passwd_init(pw, auth) 55 sudo_auth *auth; 62 auth->data = sudo_getepw(pw); 68 passwd_verify(pw, pass, auth) 71 sudo_auth *auth; 74 char *pw_epasswd = auth->data; 111 passwd_cleanup(pw, auth) 113 sudo_auth *auth; 115 char *pw_epasswd = auth->data;
|
H A D | securid5.c | 62 * auth - sudo authentication structure 65 * auth - auth->data contains pointer to new SecurID handle 70 securid_init(pw, auth) 72 sudo_auth *auth; 76 auth->data = (void *) &sd_dat; /* For method-specific data */ 93 * auth - sudo authentication structure for SecurID handle 100 securid_setup(pw, promptp, auth) 103 sudo_auth *auth; 105 SDI_HANDLE *sd = (SDI_HANDLE *) auth [all...] |
H A D | sia.c | 90 sia_setup(pw, promptp, auth) 93 sudo_auth *auth; 107 auth->data = (void *) siah; 112 sia_verify(pw, prompt, auth) 115 sudo_auth *auth; 117 SIAENTITY *siah = (SIAENTITY *) auth->data; 129 sia_cleanup(pw, auth) 131 sudo_auth *auth; 133 SIAENTITY *siah = (SIAENTITY *) auth->data;
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | build_auth.c | 113 Authenticator auth; local 120 memset(&auth, 0, sizeof(auth)); 122 auth.authenticator_vno = 5; 123 copy_Realm(&cred->client->realm, &auth.crealm); 124 copy_PrincipalName(&cred->client->name, &auth.cname); 126 krb5_us_timeofday (context, &auth.ctime, &auth.cusec); 128 ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth.subkey); 137 ALLOC(auth [all...] |
/macosx-10.10/CPANInternal-159.1/SOAP-Lite-1.11/examples/UDDI/ |
H A D | publish1.pl | 22 my $auth = get_authToken({userID => 'soaplite', cred => 'soaplite'})->authInfo; 26 my $newent = save_business($auth, $busent)->businessEntity; 34 my $result = delete_business($auth, $newkey)->result;
|
H A D | syntax2.pl | 15 my $auth = get_authToken({userID => 'USERID', cred => 'CRED'})->authInfo; 36 my $newent = save_business($auth, $busent);
|
/macosx-10.10/Heimdal-398.1.2/tests/java/ |
H A D | jaas.conf | 4 com.sun.security.auth.module.Krb5LoginModule required; 8 com.sun.security.auth.module.Krb5LoginModule required
|
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | CommonAuth.h | 6 #include <CommonAuth/heim-auth.h>
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/gke/ |
H A D | gkgenerate | 6 # will collect GKE data from all files and write two output files (name.auth and name.sigs) 22 authfile = "gke.auth" 47 authfile = args.output + ".auth" 55 for auth in data.authority.values(): 56 if auth.path in data.signatures: 57 signature = data.signatures[auth.path].signature.data 61 fail("signature unpack failed for %s" % auth.path) 62 auth.screen = stdout.rstrip(); 68 auth = { } variable 74 auth 94 auth = new_auth variable [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_authorization/lib/ |
H A D | trampolineServer.cpp | 52 if (sscanf(mboxFdText, "auth %d", &fd) != 1) 61 AuthorizationRef auth; local 62 if (OSStatus error = AuthorizationCreateFromExternalForm(&extForm, &auth)) 66 *authorization = auth;
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | process.cpp | 136 AuthorizationToken *auth = *it; local 137 while (++it != mAuthorizations.end() && *it == auth) ; // Skip duplicates 138 if (auth->endProcess(*this)) 139 delete auth; 203 void Process::addAuthorization(AuthorizationToken *auth) argument 205 assert(auth); 207 mAuthorizations.insert(auth); 208 auth->addProcess(*this); 211 void Process::checkAuthorization(AuthorizationToken *auth) argument 213 assert(auth); 219 removeAuthorization(AuthorizationToken *auth) argument [all...] |