Searched refs:authid (Results 1 - 25 of 41) sorted by relevance

12

/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/Test/
H A DHandler.java7 String authid; field in class:Handler
17 public Handler(String authid, String userid, String password, String realm) argument
19 this.authid = authid;
52 if (authid!=null) {
53 c.setName(authid);
57 /* authid = System.getProperty("user.name");
58 if (authid!=null) {
59 c.setName(authid);
H A DServerHandler.java7 String authid; field in class:ServerHandler
17 public ServerHandler(String authid, String userid, String password, String realm) argument
19 this.authid = authid;
52 if (authid!=null) {
53 c.setName(authid);
57 /* authid = System.getProperty("user.name");
58 if (authid!=null) {
59 c.setName(authid);
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sasldb/
H A Dsasldb.h62 const char *authid,
70 const char *authid,
82 typedef int (* sasldb_list_callback_t) (const char *authid,
122 char *authid, const size_t max_authid,
H A Dallockey.c91 char *authid, const size_t max_authid,
100 || (authid && !max_authid)
116 if(authid) {
119 strncpy(authid, key, max_authid);
143 const char *authid,
159 ret = _sasldb_getdata(utils, context, authid, realm, param,
183 const char *authid,
189 return _sasldb_putdata(utils, context, authid, realm, param,
194 int __sasldb_internal_list (const char *authid, argument
199 printf("%s@%s: %s\n", authid, real
90 _sasldb_parse_key(const char *key, const size_t key_len, char *authid, const size_t max_authid, char *realm, const size_t max_realm, char *propName, const size_t max_propname) argument
141 _sasldb_getsecret(const sasl_utils_t *utils, sasl_conn_t *context, const char *authid, const char *realm, sasl_secret_t ** secret) argument
181 _sasldb_putsecret(const sasl_utils_t *utils, sasl_conn_t *context, const char *authid, const char *realm, const sasl_secret_t * secret) argument
[all...]
H A Ddb_none.c53 const char *authid __attribute__((unused)),
66 const char *authid __attribute__((unused)),
H A Ddb_gdbm.c57 const char *authid,
72 if (!authid || !propName || !realm || !out || !max_out) {
84 result = _sasldb_alloc_key(utils, authid, realm, propName,
115 authid, realm, propName, path);
147 const char *authid,
163 if (!authid || !realm || !propName) {
169 result = _sasldb_alloc_key(utils, authid, realm, propName,
55 _sasldb_getdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, char *out, const size_t max_out, size_t *out_len) argument
145 _sasldb_putdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, const char *data, size_t data_len) argument
H A Ddb_ndbm.c61 const char *authid,
76 if (!authid || !propName || !realm || !out || !max_out) {
86 result = _sasldb_alloc_key(utils, authid, realm, propName,
142 const char *authid,
158 if (!authid || !realm || !propName) {
164 result = _sasldb_alloc_key(utils, authid, realm, propName,
59 _sasldb_getdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, char *out, const size_t max_out, size_t *out_len) argument
140 _sasldb_putdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, const char *data, size_t data_len) argument
H A Ddb_berkeley.c271 const char *authid,
284 if (!authid || !realm || !propName) {
296 result = _sasldb_alloc_key(utils, authid, realm, propName,
269 _sasldb_putdata(const sasl_utils_t *utils, sasl_conn_t *context, const char *authid, const char *realm, const char *propName, const char *data_in, size_t data_len) argument
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/utils/
H A Ddbconverter-2.c62 void listusers_cb(const char *authid, const char *realm, argument
68 if (!authid || !mechanism || !realm) {
74 if (strlen(authid)==0) return;
76 printf("Converting: %s@%s (%s)...",authid,realm,mechanism);
89 authid, realm, newPropBuffer,
122 char *authid = dkey.dptr; local
123 char *realm = dkey.dptr+strlen(authid)+1;
137 if (*authid && dvalue.dptr) {
139 cb(authid,realm,mech,dvalue.dptr,dvalue.dsize);
171 char *authid local
288 char *authid; local
[all...]
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/
H A DGenericClient.java94 private String authid; field in class:GenericClient
146 this.authid = nc2.getName();
162 return authid;
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/
H A Dplain.c173 oparams->authid,
310 const char *user = NULL, *authid = NULL; local
330 /* try to get the authid */
331 if (oparams->authid == NULL) {
332 auth_result = _plug_get_authid(params->utils, &authid, prompt_need);
388 result = params->canon_user(params->utils->conn, authid, 0,
396 result = params->canon_user(params->utils->conn, authid, 0,
417 memcpy(++p, oparams->authid, oparams->alen);
H A Dotp.c294 char *authid; member in struct:server_context
362 const char *authid; local
367 /* should have received authzid NUL authid */
374 SETERROR(params->utils, "Can only find OTP authzid (no authid)");
378 /* get authid */
380 authid = clientin + lup;
383 authid_len = clientin + lup - authid;
391 text->authid = params->utils->malloc(authid_len + 1);
392 if (text->authid == NULL) {
398 strncpy(text->authid, authi
1499 const char *user = NULL, *authid = NULL; local
[all...]
H A Dpassdss.c102 char *authid; /* authentication id (server) */ member in struct:context
752 if (text->authid) utils->free(text->authid);
830 "%s%s%m", &text->userid, &text->authid, &X);
1043 text->authid, 0, SASL_CU_AUTHID, oparams);
1050 oparams->authid, oparams->alen,
1063 *text->userid ? text->userid : text->authid, 0,
1245 const char *user = NULL, *authid = NULL; local
1264 /* try to get the authid */
1265 if (oparams->authid
[all...]
H A Dgs2.c115 char *authid; member in struct:context
239 if (text->authid != NULL) {
240 text->utils->free(text->authid);
241 text->authid = NULL;
485 text->authid = (char *)short_name_buf.value;
499 text->authid, 0,
775 strcmp(oparams->user, oparams->authid) ?
1520 const char *authid = NULL, *userid = NULL; local
1535 if (oparams->authid == NULL) {
1536 auth_result = _plug_get_authid(params->utils, &authid, prompt_nee
[all...]
H A Dcram.c555 const char *authid = NULL; local
594 if (oparams->authid == NULL) {
595 auth_result=_plug_get_authid(params->utils, &authid, prompt_need);
639 result = params->canon_user(params->utils->conn, authid, 0,
676 maxsize = 32+1+strlen(oparams->authid)+30;
681 snprintf(text->out_buf, maxsize, "%s %s", oparams->authid, in16);
H A Dntlm.c405 const char *authid, const char *target,
417 len = (unsigned int) (strlen(authid) + xstrlen(target));
423 /* NTLMv2hash = HMAC-MD5(NTLMhash, unicode(ucase(authid + domain))) */
428 strcpy(upper, authid);
1110 const char *authid, char *domain,
1191 iov[n].iov_base = (char*) authid;
1192 iov[n++].iov_len = (long) strlen(authid) + 1;
1475 char *domain = NULL, *authid = NULL; local
1503 (u_char **) &authid, &authid_len,
1508 /* require at least one response and an authid */
404 V2(unsigned char *V2, sasl_secret_t *passwd, const char *authid, const char *target, const unsigned char *challenge, const unsigned char *blob, unsigned bloblen, const sasl_utils_t *utils, char **buf, unsigned *buflen, int *result) argument
1109 smb_session_setup(const sasl_utils_t *utils, server_context_t *text, const char *authid, char *domain, unsigned char *lm_resp, unsigned lm_resp_len, unsigned char *nt_resp, unsigned nt_resp_len) argument
1927 const char *authid = NULL; local
[all...]
H A Dkerberos4.c746 char *user=NULL, *authid=NULL; local
759 authid = sparams->utils->malloc(alen + 1);
760 if (!authid) {
765 strcpy(authid, text->pname);
767 strcat(authid, ".");
768 strcat(authid, text->pinst);
771 strcat(authid, "@");
772 strcat(authid, text->prealm);
788 ret = sparams->canon_user(sparams->utils->conn, authid, alen,
790 sparams->utils->free(authid);
[all...]
H A Dsrp.c236 char *authid; /* authentication id (server) */ member in struct:context
1501 if (text->authid) utils->free(text->authid);
1829 "%s%s%s%o", &text->authid, &text->userid, &sid,
1838 params->serverFQDN, text->authid);
1859 text->authid, 0, SASL_CU_AUTHID, oparams);
1922 result = CalculateV(text, &text->N, &text->g, text->authid,
2070 result = CalculateM1(text, &text->N, &text->g, text->authid,
2731 const char *authid = NULL, *userid = NULL; local
2746 /* try to get the authid */
[all...]
H A Dlogin.c191 oparams->authid, oparams->alen,
387 *clientout = oparams->authid;
H A Dgssapi.c172 char *authid; /* hold the authid between steps - server */ member in struct:context
591 if (text->authid) { /* works for both client and server */
592 text->utils->free(text->authid);
593 text->authid = NULL;
963 text->authid = strdup(name_without_realm.value);
965 if (text->authid == NULL) {
970 text->authid = strdup(name_token.value);
972 if (text->authid == NULL) {
1075 /* Wait for ssf request and authid */
[all...]
H A Ddigestmd5.c182 char *authid; member in struct:reauth_entry
229 char *authid; member in struct:context
1612 if (text->authid) utils->free(text->authid);
1650 if (reauth->authid) utils->free(reauth->authid);
2122 text->authid = NULL;
2136 text->reauth->e[val].authid = NULL;
2478 (text->reauth->e[val].authid &&
2479 !strcmp(username, text->reauth->e[val].authid)))) {
4067 const char *authid = NULL, *userid = NULL, *realm = NULL; local
[all...]
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/libldap/
H A Dcyrus.c508 struct berval authid = BER_BVNULL; local
513 (void) ldap_pvt_tls_get_my_dn( ssl, &authid, NULL, 0 );
515 (void) ldap_int_sasl_external( ld, ld->ld_defconn, authid.bv_val, fac );
516 LDAP_FREE( authid.bv_val );
525 char authid[sizeof("gidNumber=4294967295+uidNumber=4294967295," local
527 sprintf( authid, "gidNumber=%u+uidNumber=%u,"
530 (void) ldap_int_sasl_external( ld, ld->ld_defconn, authid,
715 const char * authid,
735 sc = sasl_setprop( ctx, SASL_AUTH_EXTERNAL, authid );
739 extprops.auth_id = (char *) authid;
712 ldap_int_sasl_external( LDAP *ld, LDAPConn *conn, const char * authid, ber_len_t ssf ) argument
1273 ldap_int_sasl_external( LDAP *ld, LDAPConn *conn, const char * authid, ber_len_t ssf ) argument
[all...]
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/
H A Ddigest.c528 const char *authid)
530 if (digest->request.authid) {
531 krb5_set_error_message(context, EINVAL, "authid already set");
534 digest->request.authid = malloc(sizeof(*digest->request.authid));
535 if (digest->request.authid == NULL) {
539 *digest->request.authid = strdup(authid);
540 if (*digest->request.authid == NULL) {
542 free(digest->request.authid);
526 krb5_digest_set_authid(krb5_context context, krb5_digest digest, const char *authid) argument
[all...]
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sample/
H A Dsample-client.c456 *authid = NULL, local
622 authid = optarg;
713 if (authid) {
716 callback->context = authid;
810 saslfail(result, "Setting external authid", NULL);
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/lib/
H A Dcanonusr.c178 * the buffer for the authzid from the buffer for the authid */
185 oparams->authid = conn->authid_buf;
221 oparams->authid,

Completed in 332 milliseconds

12