/macosx-10.9.5/xnu-2422.115.4/bsd/kern/ |
H A D | mach_process.c | 437 cantrace(proc_t cur_procp, kauth_cred_t creds, proc_t traced_procp, int *errp) argument 461 if ((kauth_cred_getruid(creds) != kauth_cred_getruid(proc_ucred(traced_procp)) || 463 (my_err = suser(creds, &cur_procp->p_acflag)) != 0) {
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | protocol.c | 253 krb5_creds creds; local 264 ret = krb5_ret_creds(request, &creds); 274 krb5_free_cred_contents(context, &creds); 278 ret = kcm_ccache_store_cred(context, ccache, &creds, 0); 281 krb5_free_cred_contents(context, &creds); 286 if (creds.client && krb5_principal_is_root_krbtgt(context, creds.server)) 287 kcm_ccache_enqueue_default(context, ccache, &creds); 429 struct kcm_creds *creds; local 446 for (creds [all...] |
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | kcdatabase.cpp | 717 // that NOT throwing means creds is entirely well-formed (it may just be good 721 // Walk through the creds. Fish out those credentials (in order) that 727 void KeychainDatabase::establishOldSecrets(const AccessCredentials *creds) argument 743 if (creds && creds->samples().collect(CSSM_SAMPLE_TYPE_KEYCHAIN_LOCK, samples)) { 847 void KeychainDatabase::establishNewSecrets(const AccessCredentials *creds, SecurityAgent::Reason reason) argument 850 if (creds && creds->samples().collect(CSSM_SAMPLE_TYPE_KEYCHAIN_CHANGE_LOCK, samples)) { 881 creds->samples().collect(CSSM_SAMPLE_TYPE_KEYCHAIN_LOCK, oldSamples);
|
H A D | session.cpp | 353 // merge resulting creds into shared pool 411 // merge resulting creds into shared pool 567 void Session::mergeCredentials(CredentialSet &creds) argument 569 secdebug("SSsession", "%p merge creds @%p", this, &creds); 570 CredentialSet updatedCredentials = creds; 571 for (CredentialSet::const_iterator it = creds.begin(); it != creds.end(); it++) 583 creds.swap(updatedCredentials);
|
H A D | session.h | 138 void mergeCredentials(CredentialSet &creds);
|
H A D | transition.cpp | 285 CopyOutAccessCredentials creds(cred, credLength); 287 Server::database(db)->authenticate(accessType, creds); 323 CopyOutAccessCredentials creds(accessCredentials, accessCredentialsLength); 324 *db = (new TokenDatabase(ssid, connection.process(), name, creds))->handle(); 532 CopyOutAccessCredentials creds(cred, credLength); 535 *db = (new KeychainDatabase(*reinterpret_cast<DLDbFlatIdentifier*>(flatident.data()), params, connection.process(), creds, owneracl))->handle(); 599 CopyOutAccessCredentials creds(cred, credLength); 605 connection.process(), creds))->handle(); 636 CopyOutAccessCredentials creds(cred, credLength); 637 Server::keychain(db)->changePassphrase(creds); 1153 Server::aclBearer(kind, key).changeAcl(AclEdit(mode, handle, entryacl), creds); local [all...] |
/macosx-10.9.5/cups-372.4/cups/cups/ |
H A D | sspi.c | 250 NULL, &SchannelCred, NULL, NULL, &conn->creds, 327 scRet = InitializeSecurityContext(&conn->creds, NULL, TEXT(""), dwSSPIFlags, 455 scRet = InitializeSecurityContext(&conn->creds, &conn->context, NULL, dwSSPIFlags, 750 scRet = AcceptSecurityContext(&conn->creds, (fInitContext?NULL:&conn->context), 1282 status = AcceptSecurityContext(&conn->creds, &conn->context, NULL,
|
H A D | auth.c | 93 gss_cred_id_t creds; /* Returned credentials */ member in struct:_cups_gss_acquire_s 98 gss_cred_id_t creds, gss_OID_set oids, 400 data.creds = NULL; 419 OM_uint32 release_minor; /* Minor status from releasing creds */ 421 major_status = gss_init_sec_context(&minor_status, data.creds, 429 gss_release_cred(&release_minor, &data.creds); 496 gss_cred_id_t creds, /* I - Credentials (if any) */ 509 data->creds = creds; 492 cups_gss_acquire( void *ctx, OM_uint32 major, gss_status_id_t status, gss_cred_id_t creds, gss_OID_set oids, OM_uint32 time_rec) argument
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/ |
H A D | applehelpers.c | 2139 krb5_creds creds = {0}; local 2163 problem = krb5_get_init_creds_password(krbctx, &creds, princ, password, NULL, 0, 0, NULL, NULL); 2178 krb5_free_cred_contents(krbctx, &creds);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | appleCdsa.c | 410 const CSSM_ACCESS_CREDENTIALS *creds; local 436 * Get default creds 437 * FIXME: per 3420180, this needs to allow app-specified creds via 443 &creds); 451 creds, 584 CSSM_ACCESS_CREDENTIALS creds; local 599 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 603 &creds, 696 const CSSM_ACCESS_CREDENTIALS *creds; local 715 * Get default creds 1082 CSSM_ACCESS_CREDENTIALS creds; local 1143 CSSM_ACCESS_CREDENTIALS creds; local 1671 CSSM_ACCESS_CREDENTIALS creds; local 1887 CSSM_ACCESS_CREDENTIALS creds; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | appleCdsa.c | 410 const CSSM_ACCESS_CREDENTIALS *creds; local 436 * Get default creds 437 * FIXME: per 3420180, this needs to allow app-specified creds via 443 &creds); 451 creds, 584 CSSM_ACCESS_CREDENTIALS creds; local 599 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 603 &creds, 696 const CSSM_ACCESS_CREDENTIALS *creds; local 715 * Get default creds 1082 CSSM_ACCESS_CREDENTIALS creds; local 1143 CSSM_ACCESS_CREDENTIALS creds; local 1671 CSSM_ACCESS_CREDENTIALS creds; local 1887 CSSM_ACCESS_CREDENTIALS creds; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | appleCdsa.c | 410 const CSSM_ACCESS_CREDENTIALS *creds; local 436 * Get default creds 437 * FIXME: per 3420180, this needs to allow app-specified creds via 443 &creds); 451 creds, 584 CSSM_ACCESS_CREDENTIALS creds; local 599 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 603 &creds, 696 const CSSM_ACCESS_CREDENTIALS *creds; local 715 * Get default creds 1082 CSSM_ACCESS_CREDENTIALS creds; local 1143 CSSM_ACCESS_CREDENTIALS creds; local 1671 CSSM_ACCESS_CREDENTIALS creds; local 1887 CSSM_ACCESS_CREDENTIALS creds; local [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | cmspubkey.c | 727 CSSM_ACCESS_CREDENTIALS creds; local 730 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 736 &creds, 752 &creds, 885 CSSM_ACCESS_CREDENTIALS creds; local 1096 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 1101 &creds, 1254 CSSM_ACCESS_CREDENTIALS creds; local 1337 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 1355 &creds, [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | cmspubkey.c | 727 CSSM_ACCESS_CREDENTIALS creds; local 730 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 736 &creds, 752 &creds, 885 CSSM_ACCESS_CREDENTIALS creds; local 1096 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 1101 &creds, 1254 CSSM_ACCESS_CREDENTIALS creds; local 1337 memset(&creds, 0, sizeof(CSSM_ACCESS_CREDENTIALS)); 1355 &creds, [all...] |
/macosx-10.9.5/Security-55471.14.18/include/securityd_client/ |
H A D | transition.cpp | 70 DatabaseAccessCredentials creds(cred, internalAllocator); 71 CopyIn copy(creds.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 89 DatabaseAccessCredentials creds(cred, internalAllocator); 90 CopyIn copycreds(creds.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 255 DatabaseAccessCredentials creds(cred, internalAllocator); 256 CopyIn copycreds(creds.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 300 CopyIn creds(credentials.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 306 IPC(ucsp_client_decodeDb(UCSP_ARGS, &db, id.data(), id.length(), creds.data(), creds.length(), DATA(blob))); 329 CopyIn creds(cre [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurityd/lib/ |
H A D | transition.cpp | 70 DatabaseAccessCredentials creds(cred, internalAllocator); 71 CopyIn copy(creds.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 89 DatabaseAccessCredentials creds(cred, internalAllocator); 90 CopyIn copycreds(creds.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 255 DatabaseAccessCredentials creds(cred, internalAllocator); 256 CopyIn copycreds(creds.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 300 CopyIn creds(credentials.value(), reinterpret_cast<xdrproc_t>(xdr_CSSM_ACCESS_CREDENTIALS)); 306 IPC(ucsp_client_decodeDb(UCSP_ARGS, &db, id.data(), id.length(), creds.data(), creds.length(), DATA(blob))); 329 CopyIn creds(cre [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | init_creds_pw.c | 685 const krb5_creds *creds, 710 ret = _krb5_principal2principalname (a->req_body.cname, creds->client); 713 ret = copy_Realm(&creds->client->realm, &a->req_body.realm); 717 ret = _krb5_principal2principalname (a->req_body.sname, creds->server); 721 if(creds->times.starttime) { 728 *a->req_body.from = creds->times.starttime; 730 if(creds->times.endtime){ 732 *a->req_body.till = creds->times.endtime; 734 if(creds->times.renew_till){ 741 *a->req_body.rtime = creds 683 init_as_req(krb5_context context, KDCOptions opts, const krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, AS_REQ *a) argument 1218 process_pa_data_to_md(krb5_context context, const krb5_creds *creds, const AS_REQ *a, krb5_init_creds_context ctx, METHOD_DATA *in_md, METHOD_DATA **out_md, krb5_prompter_fct prompter, void *prompter_data) argument 1356 process_pa_data_to_key(krb5_context context, krb5_init_creds_context ctx, krb5_creds *creds, AS_REQ *a, AS_REP *rep, const krb5_krbhst_info *hi, krb5_keyblock **key) argument 2816 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument 2922 krb5_get_init_creds_keyblock(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keyblock *keyblock, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument 2969 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab keytab, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument [all...] |
H A D | ticket.c | 658 krb5_creds *creds, 727 creds->session.keyvalue.length = 0; 728 creds->session.keyvalue.data = NULL; 729 creds->session.keytype = rep->enc_part.key.keytype; 730 ret = krb5_data_copy (&creds->session.keyvalue, 750 creds->client, 752 &creds->session); 758 krb5_free_principal (context, creds->client); 759 creds->client = tmp_principal; 772 creds 656 _krb5_extract_ticket(krb5_context context, krb5_kdc_rep *rep, krb5_creds *creds, krb5_keyblock *key, krb5_key_usage key_usage, krb5_addresses *addrs, unsigned nonce, unsigned flags, krb5_data *request, krb5_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument [all...] |
H A D | cache.c | 70 krb5_creds creds; 83 while ((ret = krb5_cc_next_cred(context, id, &cursor, &creds)) == 0){ 86 krb5_unparse_name(context, creds.server, &principal); 89 krb5_free_cred_contents (context, &creds); 709 * Store `creds' in the ccache `id'. 720 krb5_creds *creds) 722 return (*id->ops->store)(context, id, creds); 734 krb5_creds *creds) 742 while ((ret = krb5_cc_next_cred(context, id, &cursor, creds)) == 0) { 743 if (krb5_compare_creds(context, whichfields, mcreds, creds)) { 718 krb5_cc_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument 730 retrieve_cred(krb5_context context, krb5_ccache id, krb5_flags whichfields, const krb5_creds *mcreds, krb5_creds *creds) argument 772 krb5_cc_retrieve_cred(krb5_context context, krb5_ccache id, krb5_flags whichfields, const krb5_creds *mcreds, krb5_creds *creds) argument 856 krb5_cc_next_cred(krb5_context context, const krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | dh-cdsa.c | 139 CSSM_ACCESS_CREDENTIALS creds; local 146 memset(&creds, 0, sizeof(creds)); 153 &creds,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | ks_keychain.c | 116 const CSSM_ACCESS_CREDENTIALS *creds; local 145 kSecCredentialTypeNoUI, &creds); 149 creds, cssmKey, &sigHandle); 184 const CSSM_ACCESS_CREDENTIALS *creds; local 202 kSecCredentialTypeNoUI, &creds); 206 creds, cssmKey, &sigHandle); 236 const CSSM_ACCESS_CREDENTIALS *creds; local 256 kSecCredentialTypeNoUI, &creds); 261 creds,
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | auth-krb5.c | 75 krb5_creds creds; local 131 problem = krb5_get_init_creds_password(authctxt->krb5_ctx, &creds, 142 problem = krb5_verify_init_creds(authctxt->krb5_ctx, &creds, server, 164 &creds);
|
H A D | platform.c | 113 * If we have both LOGIN_CAP and PAM, we want to establish creds 167 * If we have a chroot directory, we set all creds except real 172 char **creds = NULL, *chroot_creds[] = local 177 creds = chroot_creds; 179 if (setpcred(pw->pw_name, creds) == -1)
|
H A D | ssh-gss.h | 86 gss_cred_id_t creds; member in struct:__anon3348 111 gss_cred_id_t creds; /* server */ member in struct:__anon3349
|
/macosx-10.9.5/OpenSSH-186/openssh/contrib/redhat/ |
H A D | openssh.spec | 586 - make do_pam_setcred() smart enough to know when to establish creds and 592 - call setcred() again after initgroups, because the "creds" could actually
|