/macosx-10.10/cups-408/cups/cups/ |
H A D | tls.c | 55 httpCopyCredentials(http_t *http, cups_array_t **credentials) argument 58 if (credentials) 59 *credentials = NULL; 63 httpCredentialsAreValidForName(cups_array_t *credentials, const char *common_name) argument 65 (void)credentials; 70 httpCredentialsGetExpiration(cups_array_t *credentials) argument 72 (void)credentials; 76 httpCredentialsGetTrust(cups_array_t *credentials, const char *common_name) argument 78 (void)credentials; 83 httpCredentialsString(cups_array_t *credentials, cha argument 92 httpLoadCredentials(const char *path, cups_array_t **credentials, const char *common_name) argument 100 httpSaveCredentials(const char *path, cups_array_t *credentials, const char *common_name) argument [all...] |
H A D | tls-gnutls.c | 219 DEBUG_puts("1cupsMakeServerCredentials: Successfully created credentials."); 226 * 'cupsSetServerCredentials()' - Set the default server credentials. 228 * Note: The server credentials are used by all threads in the running process. 289 * 'httpCopyCredentials()' - Copy the credentials associated with the peer in 298 cups_array_t **credentials) /* O - Array of credentials */ 304 DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials)); 306 if (credentials) 307 *credentials 296 httpCopyCredentials( http_t *http, cups_array_t **credentials) argument 336 _httpCreateCredentials( cups_array_t *credentials) argument 350 _httpFreeCredentials( http_tls_credentials_t credentials) argument 364 httpCredentialsAreValidForName( cups_array_t *credentials, const char *common_name) argument 390 httpCredentialsGetTrust( cups_array_t *credentials, const char *common_name) argument 482 httpCredentialsGetExpiration( cups_array_t *credentials) argument 507 httpCredentialsString( cups_array_t *credentials, char *buffer, size_t bufsize) argument 563 httpLoadCredentials( const char *path, cups_array_t **credentials, const char *common_name) argument 689 httpSaveCredentials( const char *path, cups_array_t *credentials, const char *common_name) argument 1013 gnutls_certificate_credentials_t *credentials; local [all...] |
H A D | tls-darwin.c | 281 * 'cupsSetServerCredentials()' - Set the default server credentials. 283 * Note: The server credentials are used by all threads in the running process. 349 * 'httpCopyCredentials()' - Copy the credentials associated with the peer in 358 cups_array_t **credentials) /* O - Array of credentials */ 362 CFIndex count; /* Number of credentials */ 368 DEBUG_printf(("httpCopyCredentials(http=%p, credentials=%p)", http, credentials)); 370 if (credentials) 371 *credentials 356 httpCopyCredentials( http_t *http, cups_array_t **credentials) argument 421 _httpCreateCredentials( cups_array_t *credentials) argument 459 httpCredentialsAreValidForName( cups_array_t *credentials, const char *common_name) argument 522 httpCredentialsGetTrust( cups_array_t *credentials, const char *common_name) argument 606 httpCredentialsGetExpiration( cups_array_t *credentials) argument 631 httpCredentialsString( cups_array_t *credentials, char *buffer, size_t bufsize) argument 687 _httpFreeCredentials( http_tls_credentials_t credentials) argument 704 httpLoadCredentials( const char *path, cups_array_t **credentials, const char *common_name) argument 810 httpSaveCredentials( const char *path, cups_array_t *credentials, const char *common_name) argument 988 cups_array_t *credentials; /* Credentials array */ local 1590 http_tls_credentials_t credentials = NULL; local [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-syncrepl-multiproxy.conf | 64 credentials=monitor 72 credentials=secret 88 credentials=monitor 96 credentials=secret
|
H A D | slapd-syncrepl-slave-persist-ldap.conf | 55 credentials=monitor 65 credentials=secret
|
H A D | slapd-glue-ldap.conf | 54 credentials="secret" 68 credentials="secret"
|
H A D | slapd-meta.conf | 58 credentials="secret" 70 credentials="secret"
|
H A D | slapd-chain1.conf | 38 credentials=secret
|
H A D | slapd-chain2.conf | 58 credentials=secret
|
H A D | slapd-deltasync-slave.conf | 36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 61 credentials=secret
|
H A D | slapd-syncrepl-slave-persist1.conf | 36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 62 credentials=secret
|
H A D | slapd-syncrepl-slave-persist2.conf | 38 credentials=secret
|
H A D | slapd-syncrepl-slave-persist3.conf | 50 credentials=secret
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | cssmacl.h | 55 AccessCredentials *credentials() const { return AccessCredentials::overlay(AccessCred); } function in class:Security::ResourceControlContext 56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) function in class:Security::ResourceControlContext
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | cssmacl.h | 55 AccessCredentials *credentials() const { return AccessCredentials::overlay(AccessCred); } function in class:Security::ResourceControlContext 56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) function in class:Security::ResourceControlContext
|
/macosx-10.10/Heimdal-398.1.2/Sample/GSSSampleOSX/ |
H A D | AppDelegate.h | 14 @property (retain) IBOutlet NSMutableArray *credentials; variable
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | convert_creds.c | 40 * Convert the v5 credentials in in_cred to v4-dito in v4creds. This 58 struct credentials *v4creds) 68 * Convert the v5 credentials in in_cred to v4-dito in v4creds, 86 struct credentials *v4creds)
|
H A D | krb5-v4compat.h | 81 struct credentials { struct 134 _krb5_krb_tf_setup (krb5_context, struct credentials *,
|
/macosx-10.10/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_gemcutter_utilities.rb | 93 assert_match %r{Enter your RubyGems.org credentials.}, @sign_in_ui.output 97 credentials = YAML.load_file Gem.configuration.credentials_path 98 assert_equal api_key, credentials[:rubygems_api_key] 106 assert_match "Enter your http://example.com credentials.", 111 credentials = YAML.load_file Gem.configuration.credentials_path 112 assert_equal api_key, credentials[:rubygems_api_key] 120 assert_match "Enter your RubyGems.org credentials.", 125 credentials = YAML.load_file Gem.configuration.credentials_path 126 assert_equal api_key, credentials[:rubygems_api_key] 133 assert_match "Enter your http://example.com credentials [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-76-shared-credentials.c | 2 // si-76-shared-credentials.c 52 SecRequestSharedWebCredential(not_my_fqdn, NULL, ^void (CFArrayRef credentials, CFErrorRef error) { 55 is(CFArrayGetCount(credentials) > 0, false, "returned credential array == 0"); 60 // add (or update) credentials for two different accounts on the same server 83 SecRequestSharedWebCredential(fqdn, acct1, ^void (CFArrayRef credentials, CFErrorRef error) { 93 CFIndex credentialCount = CFArrayGetCount(credentials); 96 is(credentialCount == 1, true, "returned credentials == 1"); 103 SecRequestSharedWebCredential(fqdn, NULL, ^void (CFArrayRef credentials, CFErrorRef error) { 114 CFIndex credentialCount = CFArrayGetCount(credentials); 117 is(credentialCount == 1, true, "returned credentials [all...] |
/macosx-10.10/MITKerberosShim-66/mittestcc/ |
H A D | test_ccapi_util.c | 88 cred_union->credentials.credentials_v5 = v5creds; 108 if (creds_union->credentials.credentials_v5) { 109 v5creds = creds_union->credentials.credentials_v5; 133 (strcmp(a->credentials.credentials_v5->client, b->credentials.credentials_v5->client) == 0) && 134 (strcmp(a->credentials.credentials_v5->server, b->credentials.credentials_v5->server) == 0))
|
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/ |
H A D | authenticator.rb | 69 # Ensures +req+ has credentials that can be authenticated. 72 unless credentials = req[@request_field] 73 error("no credentials in the request.") 76 unless match = /^#{@auth_scheme}\s+/i.match(credentials) 77 error("invalid scheme in %s.", credentials) 78 info("%s: %s", @request_field, credentials) if $DEBUG
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecSharedCredential.h | 27 storing and requesting shared password-based credentials. 28 These credentials are currently able to be shared with Safari and 47 of credentials returned by SecRequestWebCredential. 64 Note: since a request involving shared web credentials may potentially require user interaction or other verification to be approved, this function is dispatched asynchronously; your code provides a completion handler that will be called once the results (if any) are available. 74 @param account (Optional) Account name for which passwords are being requested. The account may be NULL to request all shared credentials which are available for the site, allowing the caller to discover an existing account. 75 @param completionHandler A block which will be called to deliver the requested credentials. If no matching items were found, the credentials array will be empty, and the CFErrorRef parameter will provide the error result. Note: the credentials and error references will be automatically released after this handler is called, though you may optionally retain either for as long as needed. 78 If matching shared password items are found, the credentials provided to the completionHandler will be a CFArrayRef containing CFDictionaryRef entries. Each dictionary entry will contain the following pairs (see Security/SecItem.h): 86 Note: since a request involving shared web credentials ma [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/regressions/its4326/ |
H A D | slapd.conf | 41 credentials="secret"
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/regressions/its4448/ |
H A D | slapd-meta.conf | 57 credentials=secret
|