Searched refs:pac (Results 1 - 25 of 30) sorted by relevance

12

/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/
H A Dpickle.idl96 void sec__id_pac_format_v1_pickle([in] handle_t handle, [in] sec_id_pac_format_v1_t *pac);
97 void sec__id_pac_format_v1_unpickle([in] handle_t handle, [out] sec_id_pac_format_v1_t *pac);
99 void sec__id_pac_pickle([in] handle_t handle, [in] sec_id_pac_t *pac);
100 void sec__id_pac_unpickle([in] handle_t handle, [out] sec_id_pac_t *pac);
H A Dsec_id.c158 PUBLIC void sec_id_pac_free (sec_id_pac_t *pac) argument
162 if (pac == NULL) {
166 switch (pac->pac_type) {
170 v1 = &pac->pac.v1_pac;
190 raw = &pac->pac.raw_pac;
208 * Pickle a pac.
211 sec_id_pac_t *pac,
224 sec__id_pac_pickle(handle->idl_h, pac,
210 sec_id_pac_pickle(pickle_handle_t handle, sec_id_pac_t *pac, sec_id_pickled_pac_t **pickled_pac) argument
237 sec_id_pac_unpickle(sec_id_pickled_pac_t *pickled_pac, sec_id_pac_t *pac) argument
[all...]
H A Did_base.h152 sec_id_pac_rep_t pac; member in struct:sec_id_pac_t
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dpac.c51 struct PACTYPE *pac; member in struct:krb5_pac_data
121 krb5_pac *pac)
156 p->pac = calloc(1,
157 sizeof(*p->pac) + (sizeof(p->pac->buffers[0]) * (tmp - 1)));
158 if (p->pac == NULL) {
163 p->pac->numbuffers = tmp;
164 p->pac->version = tmp2;
166 header_end = PACTYPE_SIZE + (PAC_INFO_BUFFER_SIZE * p->pac->numbuffers);
172 for (i = 0; i < p->pac
120 krb5_pac_parse(krb5_context context, const void *ptr, size_t len, krb5_pac *pac) argument
262 krb5_pac_init(krb5_context context, krb5_pac *pac) argument
430 krb5_pac_free(krb5_context context, krb5_pac pac) argument
796 krb5_pac_verify(krb5_context context, const krb5_pac pac, time_t authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument
[all...]
H A Dtest_pac.c99 * This pac from Christan Krause
166 krb5_pac pac; local
181 ret = krb5_pac_parse(context, saved_pac, sizeof(saved_pac), &pac);
185 ret = krb5_pac_verify(context, pac, authtime, p,
190 ret = _krb5_pac_sign(context, pac, authtime, p,
195 krb5_pac_free(context, pac);
197 ret = krb5_pac_parse(context, data.data, data.length, &pac);
202 ret = krb5_pac_verify(context, pac, authtime, p,
218 ret = krb5_pac_get_types(context, pac, &len, &list);
227 ret = krb5_pac_get_buffer(context, pac, lis
[all...]
H A Dtest_ap-req.c48 {"verify-pac",0, arg_flag, &verify_pac,
142 krb5_pac pac; local
149 krb5_err(context, 1, ret, "get pac");
151 ret = krb5_pac_parse(context, data.data, data.length, &pac);
153 krb5_err(context, 1, ret, "pac parse");
155 krb5_pac_free(context, pac);
H A Drd_req.c585 * @param flag flag to select if to check the pac (TRUE) or not (FALSE).
1048 krb5_pac pac; local
1056 ret = krb5_pac_parse(context, data.data, data.length, &pac);
1062 pac,
1067 krb5_pac_free(context, pac);
H A DNTMakefile113 $(OBJ)\pac.obj \
259 pac.c \
/macosx-10.9.5/Heimdal-323.92.1/tests/plugin/
H A Dwindc.c21 struct hdb_entry_ex *client, krb5_pac *pac)
26 krb5_warnx(context, "pac generate");
31 ret = krb5_pac_init(context, pac);
35 ret = krb5_pac_add_buffer(context, *pac, 1, &data);
49 krb5_pac *pac)
56 ret = krb5_pac_get_buffer(context, *pac, 1, &data);
20 pac_generate(void *ctx, krb5_context context, struct hdb_entry_ex *client, krb5_pac *pac) argument
43 pac_verify(void *ctx, krb5_context context, const krb5_principal new_ticket_client, const krb5_principal delegation_proxy, struct hdb_entry_ex * client, struct hdb_entry_ex * server, struct hdb_entry_ex * krbtgt, krb5_pac *pac) argument
H A Dcheck-pac.in118 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} || \
123 ${kinit} --request-pac --password-file=${objdir}/foopassword foo@${R} || \
128 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} || \
133 ${kinit} --no-request-pac --password-file=${objdir}/foopassword foo@${R} || \
138 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} 2> /dev/null && \
/macosx-10.9.5/Heimdal-323.92.1/kdc/
H A Dwindc.c76 krb5_pac *pac)
78 *pac = NULL;
81 return (windcft->pac_generate)(windcctx, context, client, pac);
91 krb5_pac *pac,
102 client, server, krbtgt, pac);
74 _kdc_pac_generate(krb5_context context, hdb_entry_ex *client, krb5_pac *pac) argument
85 _kdc_pac_verify(krb5_context context, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, krb5_pac *pac, int *verified) argument
H A Dkrb5tgs.c322 krb5_pac pac; local
328 &pac);
333 ret = krb5_pac_verify(context, pac, tkt->authtime,
337 krb5_pac_free(context, pac);
343 client, server, krbtgt, &pac, &signed_pac);
345 krb5_pac_free(context, pac);
357 ret = _krb5_pac_sign(context, pac, tkt->authtime,
361 krb5_pac_free(context, pac);
H A Ddigest-service.c1257 krb5_data pac; local
1306 (uint8_t **)&pac.data,
1307 &pac.length,
1321 free(pac.data);
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/ntlm/
H A Dinquire_sec_context_by_oid.c72 if (ctx->pac.length == 0) {
78 &ctx->pac,
H A Ddelete_sec_context.c78 gss_release_buffer(minor_status, &ctx->pac);
H A Daccept_sec_context.c364 struct ntlm_buf session, uuid, pac; local
411 &pac);
452 ctx->pac.value = pac.data;
453 ctx->pac.length = pac.length;
H A Ddigest.c230 struct ntlm_buf *pac)
246 pac->data = NULL;
247 pac->length = 0;
221 dstg_type3(OM_uint32 *minor_status, ntlm_ctx ntlmctx, void *ctx, const struct ntlm_type3 *type3, ntlm_cred acceptor_cred, uint32_t *flags, uint32_t *avflags, struct ntlm_buf *sessionkey, ntlm_name *name, struct ntlm_buf *uuid, struct ntlm_buf *pac) argument
H A Dkdc.c364 struct ntlm_buf *pac)
376 pac->data = NULL;
377 pac->length = 0;
356 kdc_type3(OM_uint32 *minor_status, void *ctx, const struct ntlm_type3 *type3, ntlm_cred accept_cred, uint32_t *flags, uint32_t *avflags, struct ntlm_buf *sessionkey, ntlm_name *name, struct ntlm_buf *uuid, struct ntlm_buf *pac) argument
H A Dntlm.h168 gss_buffer_desc pac; member in struct:ntlm_ctx
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/
H A Dtest_gssntlm.c74 gss_buffer_set_t pac = GSS_C_NO_BUFFER_SET; local
79 &pac) == GSS_S_COMPLETE &&
80 pac->elements != NULL) {
82 dump_packet("Win2K PAC", pac->elements[0].value, pac->elements[0].length);
83 gss_release_buffer_set(&min_stat, &pac);
/macosx-10.9.5/dcerpc-58/dcerpc/perf/
H A Dserver.c598 sec_id_pac_t *pac = (sec_id_pac_t *) client_princ;
602 pac->principal.uuid.time_low,
603 pac->group.uuid.time_low,
604 pac->num_groups);
605 for (i = 0; i < pac->num_groups; i++)
607 printf (" %d", pac->groups[i].uuid.time_low);
586 sec_id_pac_t *pac = (sec_id_pac_t *) client_princ; local
/macosx-10.9.5/dcerpc-58/dcerpc/include/dce/
H A Did_base.idl161 [switch_is(pac_type)] sec_id_pac_rep_t pac;
/macosx-10.9.5/xnu-2422.115.4/osfmk/i386/
H A Dpmap_internal.h759 pmap_pagetable_corruption_action_t pac = pmap_classify_pagetable_corruption(pmap, vaddr, ppnp, pte, ROOT_ABSENT); local
760 if (pac == PMAP_ACTION_IGNORE)
762 else if (pac == PMAP_ACTION_ASSERT)
764 else if (pac == PMAP_ACTION_RETRY_RELOCK) {
769 else if (pac == PMAP_ACTION_RETRY)
833 pmap_pagetable_corruption_action_t pac = pmap_classify_pagetable_corruption(pmap, vaddr, ppnp, pte, ROOT_PRESENT); local
835 if (pac == PMAP_ACTION_ASSERT)
839 if (pac == PMAP_ACTION_RETRY_RELOCK) {
844 else if (pac == PMAP_ACTION_RETRY) {
847 else if (pac
[all...]
/macosx-10.9.5/ksh-20/ksh/src/lib/libast/misc/
H A Dmime.c57 Cap_t* pac; member in struct:__anon9298
258 ent->pac = cap;
264 ent->pac = ent->pac->next = cap;
271 ent->cap = ent->pac = cap;
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/
H A Deapfast_plugin.c499 PACTLVRef pac; member in struct:TLVList_s
2388 if (tlvlist_p != NULL && tlvlist_p->pac == NULL) {
2398 tlvlist_p->pac = (PACTLVRef)scan;
2519 PACTLVRef pac; local
2522 pac = (PACTLVRef)BufferGetWritePtr(buf);
2529 TLVSetLength((TLVRef)pac, TLV_HEADER_LENGTH + PAC_TYPE_TLV_LENGTH);
2530 TLVSetType((TLVRef)pac, kTLVTypePAC);
2533 pac_type = (PACTypeTLVRef)pac->pa_attributes;
2543 PACTLVRef pac; local
2546 pac
[all...]

Completed in 306 milliseconds

12