/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/ |
H A D | pickle.idl | 96 void sec__id_pac_format_v1_pickle([in] handle_t handle, [in] sec_id_pac_format_v1_t *pac); 97 void sec__id_pac_format_v1_unpickle([in] handle_t handle, [out] sec_id_pac_format_v1_t *pac); 99 void sec__id_pac_pickle([in] handle_t handle, [in] sec_id_pac_t *pac); 100 void sec__id_pac_unpickle([in] handle_t handle, [out] sec_id_pac_t *pac);
|
H A D | sec_id.c | 158 PUBLIC void sec_id_pac_free (sec_id_pac_t *pac) argument 162 if (pac == NULL) { 166 switch (pac->pac_type) { 170 v1 = &pac->pac.v1_pac; 190 raw = &pac->pac.raw_pac; 208 * Pickle a pac. 211 sec_id_pac_t *pac, 224 sec__id_pac_pickle(handle->idl_h, pac, 210 sec_id_pac_pickle(pickle_handle_t handle, sec_id_pac_t *pac, sec_id_pickled_pac_t **pickled_pac) argument 237 sec_id_pac_unpickle(sec_id_pickled_pac_t *pickled_pac, sec_id_pac_t *pac) argument [all...] |
H A D | id_base.h | 152 sec_id_pac_rep_t pac; member in struct:sec_id_pac_t
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | pac.c | 51 struct PACTYPE *pac; member in struct:krb5_pac_data 121 krb5_pac *pac) 156 p->pac = calloc(1, 157 sizeof(*p->pac) + (sizeof(p->pac->buffers[0]) * (tmp - 1))); 158 if (p->pac == NULL) { 163 p->pac->numbuffers = tmp; 164 p->pac->version = tmp2; 166 header_end = PACTYPE_SIZE + (PAC_INFO_BUFFER_SIZE * p->pac->numbuffers); 172 for (i = 0; i < p->pac 120 krb5_pac_parse(krb5_context context, const void *ptr, size_t len, krb5_pac *pac) argument 262 krb5_pac_init(krb5_context context, krb5_pac *pac) argument 430 krb5_pac_free(krb5_context context, krb5_pac pac) argument 796 krb5_pac_verify(krb5_context context, const krb5_pac pac, time_t authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument [all...] |
H A D | test_pac.c | 99 * This pac from Christan Krause 166 krb5_pac pac; local 181 ret = krb5_pac_parse(context, saved_pac, sizeof(saved_pac), &pac); 185 ret = krb5_pac_verify(context, pac, authtime, p, 190 ret = _krb5_pac_sign(context, pac, authtime, p, 195 krb5_pac_free(context, pac); 197 ret = krb5_pac_parse(context, data.data, data.length, &pac); 202 ret = krb5_pac_verify(context, pac, authtime, p, 218 ret = krb5_pac_get_types(context, pac, &len, &list); 227 ret = krb5_pac_get_buffer(context, pac, lis [all...] |
H A D | test_ap-req.c | 48 {"verify-pac",0, arg_flag, &verify_pac, 142 krb5_pac pac; local 149 krb5_err(context, 1, ret, "get pac"); 151 ret = krb5_pac_parse(context, data.data, data.length, &pac); 153 krb5_err(context, 1, ret, "pac parse"); 155 krb5_pac_free(context, pac);
|
H A D | rd_req.c | 585 * @param flag flag to select if to check the pac (TRUE) or not (FALSE). 1048 krb5_pac pac; local 1056 ret = krb5_pac_parse(context, data.data, data.length, &pac); 1062 pac, 1067 krb5_pac_free(context, pac);
|
H A D | NTMakefile | 113 $(OBJ)\pac.obj \ 259 pac.c \
|
/macosx-10.9.5/Heimdal-323.92.1/tests/plugin/ |
H A D | windc.c | 21 struct hdb_entry_ex *client, krb5_pac *pac) 26 krb5_warnx(context, "pac generate"); 31 ret = krb5_pac_init(context, pac); 35 ret = krb5_pac_add_buffer(context, *pac, 1, &data); 49 krb5_pac *pac) 56 ret = krb5_pac_get_buffer(context, *pac, 1, &data); 20 pac_generate(void *ctx, krb5_context context, struct hdb_entry_ex *client, krb5_pac *pac) argument 43 pac_verify(void *ctx, krb5_context context, const krb5_principal new_ticket_client, const krb5_principal delegation_proxy, struct hdb_entry_ex * client, struct hdb_entry_ex * server, struct hdb_entry_ex * krbtgt, krb5_pac *pac) argument
|
H A D | check-pac.in | 118 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} || \ 123 ${kinit} --request-pac --password-file=${objdir}/foopassword foo@${R} || \ 128 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} || \ 133 ${kinit} --no-request-pac --password-file=${objdir}/foopassword foo@${R} || \ 138 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} 2> /dev/null && \
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | windc.c | 76 krb5_pac *pac) 78 *pac = NULL; 81 return (windcft->pac_generate)(windcctx, context, client, pac); 91 krb5_pac *pac, 102 client, server, krbtgt, pac); 74 _kdc_pac_generate(krb5_context context, hdb_entry_ex *client, krb5_pac *pac) argument 85 _kdc_pac_verify(krb5_context context, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, krb5_pac *pac, int *verified) argument
|
H A D | krb5tgs.c | 322 krb5_pac pac; local 328 &pac); 333 ret = krb5_pac_verify(context, pac, tkt->authtime, 337 krb5_pac_free(context, pac); 343 client, server, krbtgt, &pac, &signed_pac); 345 krb5_pac_free(context, pac); 357 ret = _krb5_pac_sign(context, pac, tkt->authtime, 361 krb5_pac_free(context, pac);
|
H A D | digest-service.c | 1257 krb5_data pac; local 1306 (uint8_t **)&pac.data, 1307 &pac.length, 1321 free(pac.data);
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/ntlm/ |
H A D | inquire_sec_context_by_oid.c | 72 if (ctx->pac.length == 0) { 78 &ctx->pac,
|
H A D | delete_sec_context.c | 78 gss_release_buffer(minor_status, &ctx->pac);
|
H A D | accept_sec_context.c | 364 struct ntlm_buf session, uuid, pac; local 411 &pac); 452 ctx->pac.value = pac.data; 453 ctx->pac.length = pac.length;
|
H A D | digest.c | 230 struct ntlm_buf *pac) 246 pac->data = NULL; 247 pac->length = 0; 221 dstg_type3(OM_uint32 *minor_status, ntlm_ctx ntlmctx, void *ctx, const struct ntlm_type3 *type3, ntlm_cred acceptor_cred, uint32_t *flags, uint32_t *avflags, struct ntlm_buf *sessionkey, ntlm_name *name, struct ntlm_buf *uuid, struct ntlm_buf *pac) argument
|
H A D | kdc.c | 364 struct ntlm_buf *pac) 376 pac->data = NULL; 377 pac->length = 0; 356 kdc_type3(OM_uint32 *minor_status, void *ctx, const struct ntlm_type3 *type3, ntlm_cred accept_cred, uint32_t *flags, uint32_t *avflags, struct ntlm_buf *sessionkey, ntlm_name *name, struct ntlm_buf *uuid, struct ntlm_buf *pac) argument
|
H A D | ntlm.h | 168 gss_buffer_desc pac; member in struct:ntlm_ctx
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/ |
H A D | test_gssntlm.c | 74 gss_buffer_set_t pac = GSS_C_NO_BUFFER_SET; local 79 &pac) == GSS_S_COMPLETE && 80 pac->elements != NULL) { 82 dump_packet("Win2K PAC", pac->elements[0].value, pac->elements[0].length); 83 gss_release_buffer_set(&min_stat, &pac);
|
/macosx-10.9.5/dcerpc-58/dcerpc/perf/ |
H A D | server.c | 598 sec_id_pac_t *pac = (sec_id_pac_t *) client_princ; 602 pac->principal.uuid.time_low, 603 pac->group.uuid.time_low, 604 pac->num_groups); 605 for (i = 0; i < pac->num_groups; i++) 607 printf (" %d", pac->groups[i].uuid.time_low); 586 sec_id_pac_t *pac = (sec_id_pac_t *) client_princ; local
|
/macosx-10.9.5/dcerpc-58/dcerpc/include/dce/ |
H A D | id_base.idl | 161 [switch_is(pac_type)] sec_id_pac_rep_t pac;
|
/macosx-10.9.5/xnu-2422.115.4/osfmk/i386/ |
H A D | pmap_internal.h | 759 pmap_pagetable_corruption_action_t pac = pmap_classify_pagetable_corruption(pmap, vaddr, ppnp, pte, ROOT_ABSENT); local 760 if (pac == PMAP_ACTION_IGNORE) 762 else if (pac == PMAP_ACTION_ASSERT) 764 else if (pac == PMAP_ACTION_RETRY_RELOCK) { 769 else if (pac == PMAP_ACTION_RETRY) 833 pmap_pagetable_corruption_action_t pac = pmap_classify_pagetable_corruption(pmap, vaddr, ppnp, pte, ROOT_PRESENT); local 835 if (pac == PMAP_ACTION_ASSERT) 839 if (pac == PMAP_ACTION_RETRY_RELOCK) { 844 else if (pac == PMAP_ACTION_RETRY) { 847 else if (pac [all...] |
/macosx-10.9.5/ksh-20/ksh/src/lib/libast/misc/ |
H A D | mime.c | 57 Cap_t* pac; member in struct:__anon9298 258 ent->pac = cap; 264 ent->pac = ent->pac->next = cap; 271 ent->cap = ent->pac = cap;
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | eapfast_plugin.c | 499 PACTLVRef pac; member in struct:TLVList_s 2388 if (tlvlist_p != NULL && tlvlist_p->pac == NULL) { 2398 tlvlist_p->pac = (PACTLVRef)scan; 2519 PACTLVRef pac; local 2522 pac = (PACTLVRef)BufferGetWritePtr(buf); 2529 TLVSetLength((TLVRef)pac, TLV_HEADER_LENGTH + PAC_TYPE_TLV_LENGTH); 2530 TLVSetType((TLVRef)pac, kTLVTypePAC); 2533 pac_type = (PACTypeTLVRef)pac->pa_attributes; 2543 PACTLVRef pac; local 2546 pac [all...] |