/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/Test/ |
H A D | Handler.java | 7 String authid; field in class:Handler 17 public Handler(String authid, String userid, String password, String realm) argument 19 this.authid = authid; 52 if (authid!=null) { 53 c.setName(authid); 57 /* authid = System.getProperty("user.name"); 58 if (authid!=null) { 59 c.setName(authid);
|
H A D | ServerHandler.java | 7 String authid; field in class:ServerHandler 17 public ServerHandler(String authid, String userid, String password, String realm) argument 19 this.authid = authid; 52 if (authid!=null) { 53 c.setName(authid); 57 /* authid = System.getProperty("user.name"); 58 if (authid!=null) { 59 c.setName(authid);
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sasldb/ |
H A D | sasldb.h | 62 const char *authid, 70 const char *authid, 82 typedef int (* sasldb_list_callback_t) (const char *authid, 122 char *authid, const size_t max_authid,
|
H A D | allockey.c | 91 char *authid, const size_t max_authid, 100 || (authid && !max_authid) 116 if(authid) { 119 strncpy(authid, key, max_authid); 143 const char *authid, 159 ret = _sasldb_getdata(utils, context, authid, realm, param, 183 const char *authid, 189 return _sasldb_putdata(utils, context, authid, realm, param, 194 int __sasldb_internal_list (const char *authid, argument 199 printf("%s@%s: %s\n", authid, real 90 _sasldb_parse_key(const char *key, const size_t key_len, char *authid, const size_t max_authid, char *realm, const size_t max_realm, char *propName, const size_t max_propname) argument 141 _sasldb_getsecret(const sasl_utils_t *utils, sasl_conn_t *context, const char *authid, const char *realm, sasl_secret_t ** secret) argument 181 _sasldb_putsecret(const sasl_utils_t *utils, sasl_conn_t *context, const char *authid, const char *realm, const sasl_secret_t * secret) argument [all...] |
H A D | db_none.c | 53 const char *authid __attribute__((unused)), 66 const char *authid __attribute__((unused)),
|
H A D | db_gdbm.c | 57 const char *authid, 72 if (!authid || !propName || !realm || !out || !max_out) { 84 result = _sasldb_alloc_key(utils, authid, realm, propName, 115 authid, realm, propName, path); 147 const char *authid, 163 if (!authid || !realm || !propName) { 169 result = _sasldb_alloc_key(utils, authid, realm, propName, 55 _sasldb_getdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, char *out, const size_t max_out, size_t *out_len) argument 145 _sasldb_putdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, const char *data, size_t data_len) argument
|
H A D | db_ndbm.c | 61 const char *authid, 76 if (!authid || !propName || !realm || !out || !max_out) { 86 result = _sasldb_alloc_key(utils, authid, realm, propName, 142 const char *authid, 158 if (!authid || !realm || !propName) { 164 result = _sasldb_alloc_key(utils, authid, realm, propName, 59 _sasldb_getdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, char *out, const size_t max_out, size_t *out_len) argument 140 _sasldb_putdata(const sasl_utils_t *utils, sasl_conn_t *conn, const char *authid, const char *realm, const char *propName, const char *data, size_t data_len) argument
|
H A D | db_berkeley.c | 271 const char *authid, 284 if (!authid || !realm || !propName) { 296 result = _sasldb_alloc_key(utils, authid, realm, propName, 269 _sasldb_putdata(const sasl_utils_t *utils, sasl_conn_t *context, const char *authid, const char *realm, const char *propName, const char *data_in, size_t data_len) argument
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/utils/ |
H A D | dbconverter-2.c | 62 void listusers_cb(const char *authid, const char *realm, argument 68 if (!authid || !mechanism || !realm) { 74 if (strlen(authid)==0) return; 76 printf("Converting: %s@%s (%s)...",authid,realm,mechanism); 89 authid, realm, newPropBuffer, 122 char *authid = dkey.dptr; local 123 char *realm = dkey.dptr+strlen(authid)+1; 137 if (*authid && dvalue.dptr) { 139 cb(authid,realm,mech,dvalue.dptr,dvalue.dsize); 171 char *authid local 288 char *authid; local [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/ |
H A D | GenericClient.java | 94 private String authid; field in class:GenericClient 146 this.authid = nc2.getName(); 162 return authid;
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | plain.c | 173 oparams->authid, 310 const char *user = NULL, *authid = NULL; local 330 /* try to get the authid */ 331 if (oparams->authid == NULL) { 332 auth_result = _plug_get_authid(params->utils, &authid, prompt_need); 388 result = params->canon_user(params->utils->conn, authid, 0, 396 result = params->canon_user(params->utils->conn, authid, 0, 417 memcpy(++p, oparams->authid, oparams->alen);
|
H A D | otp.c | 294 char *authid; member in struct:server_context 362 const char *authid; local 367 /* should have received authzid NUL authid */ 374 SETERROR(params->utils, "Can only find OTP authzid (no authid)"); 378 /* get authid */ 380 authid = clientin + lup; 383 authid_len = clientin + lup - authid; 391 text->authid = params->utils->malloc(authid_len + 1); 392 if (text->authid == NULL) { 398 strncpy(text->authid, authi 1499 const char *user = NULL, *authid = NULL; local [all...] |
H A D | passdss.c | 102 char *authid; /* authentication id (server) */ member in struct:context 752 if (text->authid) utils->free(text->authid); 830 "%s%s%m", &text->userid, &text->authid, &X); 1043 text->authid, 0, SASL_CU_AUTHID, oparams); 1050 oparams->authid, oparams->alen, 1063 *text->userid ? text->userid : text->authid, 0, 1245 const char *user = NULL, *authid = NULL; local 1264 /* try to get the authid */ 1265 if (oparams->authid [all...] |
H A D | gs2.c | 115 char *authid; member in struct:context 239 if (text->authid != NULL) { 240 text->utils->free(text->authid); 241 text->authid = NULL; 485 text->authid = (char *)short_name_buf.value; 499 text->authid, 0, 775 strcmp(oparams->user, oparams->authid) ? 1520 const char *authid = NULL, *userid = NULL; local 1535 if (oparams->authid == NULL) { 1536 auth_result = _plug_get_authid(params->utils, &authid, prompt_nee [all...] |
H A D | cram.c | 555 const char *authid = NULL; local 594 if (oparams->authid == NULL) { 595 auth_result=_plug_get_authid(params->utils, &authid, prompt_need); 639 result = params->canon_user(params->utils->conn, authid, 0, 676 maxsize = 32+1+strlen(oparams->authid)+30; 681 snprintf(text->out_buf, maxsize, "%s %s", oparams->authid, in16);
|
H A D | ntlm.c | 405 const char *authid, const char *target, 417 len = (unsigned int) (strlen(authid) + xstrlen(target)); 423 /* NTLMv2hash = HMAC-MD5(NTLMhash, unicode(ucase(authid + domain))) */ 428 strcpy(upper, authid); 1110 const char *authid, char *domain, 1191 iov[n].iov_base = (char*) authid; 1192 iov[n++].iov_len = (long) strlen(authid) + 1; 1475 char *domain = NULL, *authid = NULL; local 1503 (u_char **) &authid, &authid_len, 1508 /* require at least one response and an authid */ 404 V2(unsigned char *V2, sasl_secret_t *passwd, const char *authid, const char *target, const unsigned char *challenge, const unsigned char *blob, unsigned bloblen, const sasl_utils_t *utils, char **buf, unsigned *buflen, int *result) argument 1109 smb_session_setup(const sasl_utils_t *utils, server_context_t *text, const char *authid, char *domain, unsigned char *lm_resp, unsigned lm_resp_len, unsigned char *nt_resp, unsigned nt_resp_len) argument 1927 const char *authid = NULL; local [all...] |
H A D | kerberos4.c | 746 char *user=NULL, *authid=NULL; local 759 authid = sparams->utils->malloc(alen + 1); 760 if (!authid) { 765 strcpy(authid, text->pname); 767 strcat(authid, "."); 768 strcat(authid, text->pinst); 771 strcat(authid, "@"); 772 strcat(authid, text->prealm); 788 ret = sparams->canon_user(sparams->utils->conn, authid, alen, 790 sparams->utils->free(authid); [all...] |
H A D | srp.c | 236 char *authid; /* authentication id (server) */ member in struct:context 1501 if (text->authid) utils->free(text->authid); 1829 "%s%s%s%o", &text->authid, &text->userid, &sid, 1838 params->serverFQDN, text->authid); 1859 text->authid, 0, SASL_CU_AUTHID, oparams); 1922 result = CalculateV(text, &text->N, &text->g, text->authid, 2070 result = CalculateM1(text, &text->N, &text->g, text->authid, 2731 const char *authid = NULL, *userid = NULL; local 2746 /* try to get the authid */ [all...] |
H A D | login.c | 191 oparams->authid, oparams->alen, 387 *clientout = oparams->authid;
|
H A D | gssapi.c | 172 char *authid; /* hold the authid between steps - server */ member in struct:context 591 if (text->authid) { /* works for both client and server */ 592 text->utils->free(text->authid); 593 text->authid = NULL; 963 text->authid = strdup(name_without_realm.value); 965 if (text->authid == NULL) { 970 text->authid = strdup(name_token.value); 972 if (text->authid == NULL) { 1075 /* Wait for ssf request and authid */ [all...] |
H A D | digestmd5.c | 182 char *authid; member in struct:reauth_entry 229 char *authid; member in struct:context 1612 if (text->authid) utils->free(text->authid); 1650 if (reauth->authid) utils->free(reauth->authid); 2122 text->authid = NULL; 2136 text->reauth->e[val].authid = NULL; 2478 (text->reauth->e[val].authid && 2479 !strcmp(username, text->reauth->e[val].authid)))) { 4067 const char *authid = NULL, *userid = NULL, *realm = NULL; local [all...] |
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | cyrus.c | 508 struct berval authid = BER_BVNULL; local 513 (void) ldap_pvt_tls_get_my_dn( ssl, &authid, NULL, 0 ); 515 (void) ldap_int_sasl_external( ld, ld->ld_defconn, authid.bv_val, fac ); 516 LDAP_FREE( authid.bv_val ); 525 char authid[sizeof("gidNumber=4294967295+uidNumber=4294967295," local 527 sprintf( authid, "gidNumber=%u+uidNumber=%u," 530 (void) ldap_int_sasl_external( ld, ld->ld_defconn, authid, 715 const char * authid, 735 sc = sasl_setprop( ctx, SASL_AUTH_EXTERNAL, authid ); 739 extprops.auth_id = (char *) authid; 712 ldap_int_sasl_external( LDAP *ld, LDAPConn *conn, const char * authid, ber_len_t ssf ) argument 1273 ldap_int_sasl_external( LDAP *ld, LDAPConn *conn, const char * authid, ber_len_t ssf ) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | digest.c | 528 const char *authid) 530 if (digest->request.authid) { 531 krb5_set_error_message(context, EINVAL, "authid already set"); 534 digest->request.authid = malloc(sizeof(*digest->request.authid)); 535 if (digest->request.authid == NULL) { 539 *digest->request.authid = strdup(authid); 540 if (*digest->request.authid == NULL) { 542 free(digest->request.authid); 526 krb5_digest_set_authid(krb5_context context, krb5_digest digest, const char *authid) argument [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sample/ |
H A D | sample-client.c | 456 *authid = NULL, local 622 authid = optarg; 713 if (authid) { 716 callback->context = authid; 810 saslfail(result, "Setting external authid", NULL);
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/lib/ |
H A D | canonusr.c | 178 * the buffer for the authzid from the buffer for the authid */ 185 oparams->authid = conn->authid_buf; 221 oparams->authid,
|