Searched refs:credentials (Results 1 - 25 of 102) sorted by relevance

12345

/macosx-10.10/cups-408/cups/cups/
H A Dtls.c55 httpCopyCredentials(http_t *http, cups_array_t **credentials) argument
58 if (credentials)
59 *credentials = NULL;
63 httpCredentialsAreValidForName(cups_array_t *credentials, const char *common_name) argument
65 (void)credentials;
70 httpCredentialsGetExpiration(cups_array_t *credentials) argument
72 (void)credentials;
76 httpCredentialsGetTrust(cups_array_t *credentials, const char *common_name) argument
78 (void)credentials;
83 httpCredentialsString(cups_array_t *credentials, cha argument
92 httpLoadCredentials(const char *path, cups_array_t **credentials, const char *common_name) argument
100 httpSaveCredentials(const char *path, cups_array_t *credentials, const char *common_name) argument
[all...]
H A Dtls-gnutls.c219 DEBUG_puts("1cupsMakeServerCredentials: Successfully created credentials.");
226 * 'cupsSetServerCredentials()' - Set the default server credentials.
228 * Note: The server credentials are used by all threads in the running process.
289 * 'httpCopyCredentials()' - Copy the credentials associated with the peer in
298 cups_array_t **credentials) /* O - Array of credentials */
304 DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials));
306 if (credentials)
307 *credentials
296 httpCopyCredentials( http_t *http, cups_array_t **credentials) argument
336 _httpCreateCredentials( cups_array_t *credentials) argument
350 _httpFreeCredentials( http_tls_credentials_t credentials) argument
364 httpCredentialsAreValidForName( cups_array_t *credentials, const char *common_name) argument
390 httpCredentialsGetTrust( cups_array_t *credentials, const char *common_name) argument
482 httpCredentialsGetExpiration( cups_array_t *credentials) argument
507 httpCredentialsString( cups_array_t *credentials, char *buffer, size_t bufsize) argument
563 httpLoadCredentials( const char *path, cups_array_t **credentials, const char *common_name) argument
689 httpSaveCredentials( const char *path, cups_array_t *credentials, const char *common_name) argument
1013 gnutls_certificate_credentials_t *credentials; local
[all...]
H A Dtls-darwin.c281 * 'cupsSetServerCredentials()' - Set the default server credentials.
283 * Note: The server credentials are used by all threads in the running process.
349 * 'httpCopyCredentials()' - Copy the credentials associated with the peer in
358 cups_array_t **credentials) /* O - Array of credentials */
362 CFIndex count; /* Number of credentials */
368 DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials));
370 if (credentials)
371 *credentials
356 httpCopyCredentials( http_t *http, cups_array_t **credentials) argument
421 _httpCreateCredentials( cups_array_t *credentials) argument
459 httpCredentialsAreValidForName( cups_array_t *credentials, const char *common_name) argument
522 httpCredentialsGetTrust( cups_array_t *credentials, const char *common_name) argument
606 httpCredentialsGetExpiration( cups_array_t *credentials) argument
631 httpCredentialsString( cups_array_t *credentials, char *buffer, size_t bufsize) argument
687 _httpFreeCredentials( http_tls_credentials_t credentials) argument
704 httpLoadCredentials( const char *path, cups_array_t **credentials, const char *common_name) argument
810 httpSaveCredentials( const char *path, cups_array_t *credentials, const char *common_name) argument
988 cups_array_t *credentials; /* Credentials array */ local
1590 http_tls_credentials_t credentials = NULL; local
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/
H A Dslapd-syncrepl-multiproxy.conf64 credentials=monitor
72 credentials=secret
88 credentials=monitor
96 credentials=secret
H A Dslapd-syncrepl-slave-persist-ldap.conf55 credentials=monitor
65 credentials=secret
H A Dslapd-glue-ldap.conf54 credentials="secret"
68 credentials="secret"
H A Dslapd-meta.conf58 credentials="secret"
70 credentials="secret"
H A Dslapd-chain1.conf38 credentials=secret
H A Dslapd-chain2.conf58 credentials=secret
H A Dslapd-deltasync-slave.conf36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
61 credentials=secret
H A Dslapd-syncrepl-slave-persist1.conf36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
62 credentials=secret
H A Dslapd-syncrepl-slave-persist2.conf38 credentials=secret
H A Dslapd-syncrepl-slave-persist3.conf50 credentials=secret
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/
H A Dcssmacl.h55 AccessCredentials *credentials() const { return AccessCredentials::overlay(AccessCred); } function in class:Security::ResourceControlContext
56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) function in class:Security::ResourceControlContext
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dcssmacl.h55 AccessCredentials *credentials() const { return AccessCredentials::overlay(AccessCred); } function in class:Security::ResourceControlContext
56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) function in class:Security::ResourceControlContext
/macosx-10.10/Heimdal-398.1.2/Sample/GSSSampleOSX/
H A DAppDelegate.h14 @property (retain) IBOutlet NSMutableArray *credentials; variable
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dconvert_creds.c40 * Convert the v5 credentials in in_cred to v4-dito in v4creds. This
58 struct credentials *v4creds)
68 * Convert the v5 credentials in in_cred to v4-dito in v4creds,
86 struct credentials *v4creds)
H A Dkrb5-v4compat.h81 struct credentials { struct
134 _krb5_krb_tf_setup (krb5_context, struct credentials *,
/macosx-10.10/ruby-106/ruby/test/rubygems/
H A Dtest_gem_gemcutter_utilities.rb93 assert_match %r{Enter your RubyGems.org credentials.}, @sign_in_ui.output
97 credentials = YAML.load_file Gem.configuration.credentials_path
98 assert_equal api_key, credentials[:rubygems_api_key]
106 assert_match "Enter your http://example.com credentials.",
111 credentials = YAML.load_file Gem.configuration.credentials_path
112 assert_equal api_key, credentials[:rubygems_api_key]
120 assert_match "Enter your RubyGems.org credentials.",
125 credentials = YAML.load_file Gem.configuration.credentials_path
126 assert_equal api_key, credentials[:rubygems_api_key]
133 assert_match "Enter your http://example.com credentials
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-76-shared-credentials.c2 // si-76-shared-credentials.c
52 SecRequestSharedWebCredential(not_my_fqdn, NULL, ^void (CFArrayRef credentials, CFErrorRef error) {
55 is(CFArrayGetCount(credentials) > 0, false, "returned credential array == 0");
60 // add (or update) credentials for two different accounts on the same server
83 SecRequestSharedWebCredential(fqdn, acct1, ^void (CFArrayRef credentials, CFErrorRef error) {
93 CFIndex credentialCount = CFArrayGetCount(credentials);
96 is(credentialCount == 1, true, "returned credentials == 1");
103 SecRequestSharedWebCredential(fqdn, NULL, ^void (CFArrayRef credentials, CFErrorRef error) {
114 CFIndex credentialCount = CFArrayGetCount(credentials);
117 is(credentialCount == 1, true, "returned credentials
[all...]
/macosx-10.10/MITKerberosShim-66/mittestcc/
H A Dtest_ccapi_util.c88 cred_union->credentials.credentials_v5 = v5creds;
108 if (creds_union->credentials.credentials_v5) {
109 v5creds = creds_union->credentials.credentials_v5;
133 (strcmp(a->credentials.credentials_v5->client, b->credentials.credentials_v5->client) == 0) &&
134 (strcmp(a->credentials.credentials_v5->server, b->credentials.credentials_v5->server) == 0))
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/
H A Dauthenticator.rb69 # Ensures +req+ has credentials that can be authenticated.
72 unless credentials = req[@request_field]
73 error("no credentials in the request.")
76 unless match = /^#{@auth_scheme}\s+/i.match(credentials)
77 error("invalid scheme in %s.", credentials)
78 info("%s: %s", @request_field, credentials) if $DEBUG
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecSharedCredential.h27 storing and requesting shared password-based credentials.
28 These credentials are currently able to be shared with Safari and
47 of credentials returned by SecRequestWebCredential.
64 Note: since a request involving shared web credentials may potentially require user interaction or other verification to be approved, this function is dispatched asynchronously; your code provides a completion handler that will be called once the results (if any) are available.
74 @param account (Optional) Account name for which passwords are being requested. The account may be NULL to request all shared credentials which are available for the site, allowing the caller to discover an existing account.
75 @param completionHandler A block which will be called to deliver the requested credentials. If no matching items were found, the credentials array will be empty, and the CFErrorRef parameter will provide the error result. Note: the credentials and error references will be automatically released after this handler is called, though you may optionally retain either for as long as needed.
78 If matching shared password items are found, the credentials provided to the completionHandler will be a CFArrayRef containing CFDictionaryRef entries. Each dictionary entry will contain the following pairs (see Security/SecItem.h):
86 Note: since a request involving shared web credentials ma
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/regressions/its4326/
H A Dslapd.conf41 credentials="secret"
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/regressions/its4448/
H A Dslapd-meta.conf57 credentials=secret

Completed in 237 milliseconds

12345