Searched refs:inVersion (Results 1 - 7 of 7) sorted by relevance

/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/KClientCompat/
H A DKClientCompat.h144 /* * KClient 1.9 deprecated API * * $Header: /Volumes/backup/dsmigrate/Dumps/../CVS/passwordserver_sasl/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/KClientCompat/KClientCompat.h,v 1.4 2005/01/10 19:17:31 snsimon Exp $ */ #ifndef __KCLIENTCOMPAT__ #define __KCLIENTCOMPAT__ /* Constants */ /* Error codes, only listing the ones actually returned by the library */ enum { cKrbMapDoesntExist = -1020, /* tried to access a map that doesn't exist (index too large, or criteria doesn't match anything) */ cKrbSessDoesntExist = -1019, /* tried to access a session that doesn't exist */ cKrbCredsDontExist = -1018, /* tried to access credentials that don't exist */ cKrbUserCancelled = -1016, /* user cancelled a log in operation */ cKrbConfigurationErr = -1015, /* Kerberos Preference file is not configured properly */ cKrbServerRejected = -1014, /* A server rejected our ticket */ cKrbServerImposter = -1013, /* Server appears to be a phoney */ cKrbServerRespIncomplete = -1012, /* Server response is not complete */ cKrbNotLoggedIn = -1011, /* Returned by cKrbGetUserName if user is not logged in */ cKrbAppInBkgnd = -1008, /* driver won't put up password dialog when in background */ cKrbInvalidSession = -1007, /* invalid structure passed to KClient/KServer routine */ cKrbKerberosErrBlock = -20000 /* start of block of 256 kerberos error numbers */ }; #ifndef rez #if PRAGMA_ONCE #pragma once #endif /* PRAGMA_ONCE */ #include <Kerberos4/Kerberos4.h> #include <KClient/KClientTypes.h> #ifdef __cplusplus extern "C" { #endif typedef KClientSession KClientSessionInfo; enum { KClientLoggedIn, KClientNotLoggedIn }; OSErr KClientVersionCompat ( SInt16* outMajorVersion, SInt16* outMinorVersion, char* outVersionString); OSErr KClientNewSessionCompat ( KClientSessionInfo* inSession, UInt32 inLocalAddress, UInt16 inLocalPort, UInt32 inRemoteAddress, UInt16 inRemotePort); OSErr KClientDisposeSessionCompat ( KClientSessionInfo* inSession); OSErr KClientGetTicketForServiceCompat ( KClientSessionInfo* inSession, char* inService, void* inBuffer, UInt32* outBufferLength); OSErr KClientGetTicketForServiceWithChecksumCompat ( KClientSessionInfo* inSession, UInt32 inChecksum, char* inService, void* inBuffer, UInt32* outBufferLength); OSErr KClientLoginCompat ( KClientSessionInfo* inSession, KClientKey* outPrivateKey); OSErr KClientPasswordLoginCompat ( KClientSessionInfo* inSession, char* inPassword, KClientKey* outPrivateKey); OSErr KClientLogoutCompat (void); SInt16 KClientStatusCompat (void); OSErr KClientGetSessionKeyCompat ( KClientSessionInfo* inSession, KClientKey* outSessionKey); OSErr KClientEncryptCompat ( KClientSessionInfo* inSession, void* inPlainBuffer, UInt32 inPlainBufferLength, void* outEncryptedBuffer, UInt32* ioEncryptedBufferLength); OSErr KClientDecryptCompat ( KClientSessionInfo* inSession, void* inEncryptedBuffer, UInt32 inEncryptedBufferLength, UInt32* outPlainBufferOffset, UInt32* outPlainBufferLength); OSErr KClientProtectIntegrityCompat ( KClientSessionInfo* inSession, void* inPlainBuffer, UInt32 inPlainBufferLength, void* outProtectedBuffer, UInt32* ioProtectedBufferLength); OSErr KClientVerifyIntegrityCompat ( KClientSessionInfo* inSession, void* inProtectedBuffer, UInt32 inProtectedBufferLength, UInt32* outPlainBufferOffset, UInt32* outPlainBufferLength); OSErr KServerNewSessionCompat ( KClientSessionInfo* inSession, char* inService, UInt32 inLocalAddress, UInt16 inLocalPort, UInt32 inRemoteAddress, UInt16 inRemotePort); OSErr KServerVerifyTicketCompat ( KClientSessionInfo* inSession, void* inBuffer, char* inFilename); OSErr KServerGetReplyTicketCompat ( KClientSessionInfo* inSession, void* outBuffer, UInt32* ioBufferLength); OSErr KServerAddKeyCompat ( KClientSessionInfo* inSession, KClientKey* inPrivateKey, char* inService, SInt32 inVersion, char* inFilename); OSErr KServerGetKeyCompat ( KClientSessionInfo* inSession, KClientKey* outPrivateKey, char* inService, SInt32 inVersion, char* inFilename); OSErr KServerGetSessionTimeRemainingCompat ( KClientSessionInfo* inS (…)
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/KClient/
H A DKClient.h157 /* * KClient 3.0 API declarations * See KClient30-API.html * * $Header: /Volumes/backup/dsmigrate/Dumps/../CVS/passwordserver_sasl/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/KClient/KClient.h,v 1.4 2005/01/10 19:17:31 snsimon Exp $ */ #ifndef __KCLIENT__ #define __KCLIENT__ /* Constants */ enum { /* No error */ kcNoError = 0, /* General runtime errors */ kcErrNoMemory = 23000, kcErrBadParam, /* Various invalid structures */ kcErrInvalidSession = 23010, kcErrInvalidPrincipal, kcErrInvalidAddress, kcErrInvalidFile, /* Missing required settings in the session */ kcErrNoClientPrincipal = 23020, kcErrNoServerPrincipal, kcErrNoLocalAddress, kcErrNoRemoteAddress, kcErrNoSessionKey, kcErrNoServiceKey, kcErrNoChecksum, kcErrNotLoggedIn = 23030, kcErrUserCancelled, kcErrIncorrectPassword, kcErrBufferTooSmall = 23040, kcErrKeyFileAccess, kcErrFileNotFound, kcErrInvalidPreferences, kcErrChecksumMismatch, kcFirstKerberosError = 20000, kcLastKerberosError = kcFirstKerberosError + 256 }; #ifndef rez #include <KerberosSupport/KerberosSupport.h> #include <CredentialsCache/CredentialsCache.h> #include <KerberosProfile/KerberosProfile.h> #include <KerberosDES/KerberosDES.h> #include <KClient/KClientTypes.h> #if TARGET_API_MAC_OSX && TARGET_API_MAC_CARBON #include <CoreServices/CoreServices.h> #elif TARGET_API_MAC_OS8 || TARGET_API_MAC_CARBON #include <Files.h> #else #error "Unknown OS" #endif #ifdef __cplusplus extern "C" { #endif /* Functions */ OSStatus KClientGetVersion ( UInt16* outMajorVersion, UInt16* outMinorVersion, const char** outVersionString); /* Initialization / destruction */ OSStatus KClientNewClientSession ( KClientSession* outSession); OSStatus KClientNewServerSession ( KClientSession* inSession, KClientPrincipal inService); OSStatus KClientDisposeSession ( KClientSession inSession); /* Accessing session properties */ OSStatus KClientGetClientPrincipal ( KClientSession inSession, KClientPrincipal* outPrincipal); OSStatus KClientSetClientPrincipal ( KClientSession inSession, KClientPrincipal inPrincipal); OSStatus KClientGetServerPrincipal ( KClientSession inSession, KClientPrincipal* outPrincipal); OSStatus KClientSetServerPrincipal ( KClientSession inSession, KClientPrincipal inPrincipal); OSStatus KClientGetLocalAddress ( KClientSession inSession, KClientAddress* outLocalAddress); OSStatus KClientSetLocalAddress ( KClientSession inSession, const KClientAddress* inLocalAddress); OSStatus KClientGetRemoteAddress ( KClientSession inSession, KClientAddress* outRemoteAddress); OSStatus KClientSetRemoteAddress ( KClientSession inSession, const KClientAddress* inRemoteAddress); OSStatus KClientGetSessionKey ( KClientSession inSession, KClientKey* outKey); OSStatus KClientGetExpirationTime ( KClientSession inSession, UInt32* outExpiration); OSStatus KClientSetKeyFile ( KClientSession inSession, const KClientFile* inKeyFile); /* Logging in and out (client) */ OSStatus KClientLogin ( KClientSession inSession); OSStatus KClientPasswordLogin ( KClientSession inSession, const char* inPassword); OSStatus KClientKeyFileLogin ( KClientSession inSession); /*OSStatus KClientKeyLogin ( KClientSession inSession, const KClientKey* inKey);*/ OSStatus KClientLogout ( KClientSession inSession); /* Accessing service keys (server) */ OSStatus KClientGetServiceKey ( KClientSession inSession, UInt32 inVersion, KClientKey* outKey); OSStatus KClientAddServiceKey ( KClientSession inSession, UInt32 inVersion, const KClientKey* inKey); /* Authenticating to a service (client) */ OSStatus KClientGetTick (…)
/macosx-10.9.5/MITKerberosShim-62.1/
H A DKrb4DeprecatedAPIs.c781 char *inService, SInt32 inVersion, char *inFilename)
788 char *inService, SInt32 inVersion, char *inFilename)
926 OSStatus KClientGetServiceKey (KClientSession inSession, UInt32 inVersion, KClientKey *outKey) argument
931 OSStatus KClientAddServiceKey (KClientSession inSession, UInt32 inVersion, const KClientKey *inKey) argument
780 KServerAddKeyCompat(KClientSessionInfo *inSession, KClientKey *inPrivateKey, char *inService, SInt32 inVersion, char *inFilename) argument
787 KServerGetKeyCompat(KClientSessionInfo *inSession, KClientKey *outPrivateKey, char *inService, SInt32 inVersion, char *inFilename) argument
/macosx-10.9.5/smb-697.95.1/lib/smbclient/
H A Dsmbclient.h258 * @param inVersion The version of the properties requested
268 uint32_t inVersion,
H A Dserver.c669 uint32_t inVersion,
681 if ((outProperties == NULL) || (inVersion != kPropertiesVersion) ||
666 SMBGetServerProperties( SMBHANDLE inConnection, void *outProperties, uint32_t inVersion, size_t inPropertiesSize) argument
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSShared/
H A DDebugServices.c149 static char * DebugNumVersionToString( uint32_t inVersion, char *inString );
2382 static char * DebugNumVersionToString( uint32_t inVersion, char *inString ) argument
2393 majorRev = (uint8_t)( ( inVersion >> 24 ) & 0xFF );
2394 minor = (uint8_t)( ( inVersion >> 20 ) & 0x0F );
2395 bugFix = (uint8_t)( ( inVersion >> 16 ) & 0x0F );
2396 stage = (uint8_t)( ( inVersion >> 8 ) & 0xFF );
2397 revision = (uint8_t)( inVersion & 0xFF );
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/
H A DCredentialsCache.h440 /* $Copyright: * * Copyright 1998-2000 by the Massachusetts Institute of Technology. * * All rights reserved. * * Export of this software from the United States of America may require a * specific license from the United States Government. It is the * responsibility of any person or organization contemplating export to * obtain such a license before exporting. * * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute * this software and its documentation for any purpose and without fee is * hereby granted, provided that the above copyright notice appear in all * copies and that both that copyright notice and this permission notice * appear in supporting documentation, and that the name of M.I.T. not be * used in advertising or publicity pertaining to distribution of the * software without specific, written prior permission. Furthermore if you * modify this software you must label your software as modified software * and not distribute it in such a fashion that it might be confused with * the original MIT software. M.I.T. makes no representations about the * suitability of this software for any purpose. It is provided "as is" * without express or implied warranty. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF * MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. * * Individual source code files are copyright MIT, Cygnus Support, * OpenVision, Oracle, Sun Soft, FundsXpress, and others. * * Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira, * and Zephyr are trademarks of the Massachusetts Institute of Technology * (MIT). No commercial use of these trademarks may be made without prior * written permission of MIT. * * "Commercial use" means use of a name in a product or other for-profit * manner. It does NOT prevent a commercial firm from referring to the MIT * trademarks in order to convey information (although in doing so, * recognition of their trademark status should be given). * $ */ /* $Header: /Volumes/backup/dsmigrate/Dumps/../CVS/passwordserver_sasl/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/CredentialsCache.h,v 1.4 2005/01/10 19:17:31 snsimon Exp $ */ /* * Declarations for Credentials Cache API Library * * API specification: <http://web.mit.edu/pismere/kerberos/ccache-api-v2.html> * * Revision 1: Frank Dabek, 6/4/1998 * Revision 2: meeroh, 2/24/1999 * Revision 3: meeroh, 11/12/1999 * */ #ifndef __CREDENTIALSCACHE__ #define __CREDENTIALSCACHE__ #ifdef __cplusplus extern "C" { #endif /* __cplusplus */ #include <KerberosSupport/KerberosConditionalMacros.h> #if TARGET_API_MAC_OSX && TARGET_API_MAC_CARBON #include <CoreServices/CoreServices.h> #elif TARGET_API_MAC_OS8 || TARGET_API_MAC_CARBON #include <MacTypes.h> #else #error "Unknown OS; no system types available" #endif #if PRAGMA_IMPORT # pragma import on #endif /* This stuff is to make sure that we always use the same compiler options for this header file. Otherwise we get really exciting failure modes -- meeroh */ #if PRAGMA_STRUCT_ALIGN #pragma options align=mac68k4byte #elif PRAGMA_STRUCT_PACKPUSH #pragma pack(push, 4) #elif PRAGMA_STRUCT_PACK #pragma pack(4) #endif #if PRAGMA_ENUM_ALWAYSINT #pragma enumsalwaysint on #endif #if TARGET_CPU_68K #pragma fourbyteints on #endif /* * Constants */ /* API versions */ enum { ccapi_version_2 = 2, ccapi_version_3 = 3, ccapi_version_4 = 4 }; /* Errors */ enum { ccNoError = 0, ccIteratorEnd = 201, ccErrBadParam, ccErrNoMem, ccErrInvalidContext, ccErrInvalidCCache, ccErrInvalidString, /* 206 */ ccErrInvalidCredentials, ccErrInvalidCCacheIterator, ccErrInvalidCredentialsIterator, ccErrInvalidLock, ccErrBadName, /* 211 */ ccErrBadCredentialsVersion, ccErrBadAPIVersion, ccErrContextLocked, ccErrContextUnlocked, ccErrCCacheLocked, /* 216 */ ccErrCCacheUnlocked, ccErrBadLockType, ccErrNeverDefault, ccErrCredentialsNotFound, ccErrCCacheNotFound, /* 221 */ ccErrContextNotFound, ccErrServerUnavailable }; /* Credentials versions */ enum { cc_credentials_v4 = 1, cc_credentials_v5 = 2, cc_credentials_v4_v5 = 3 }; /* * Basic types */ typedef UInt32 cc_uint32; typedef SInt32 cc_int32; typedef cc_uint32 cc_time_t; /* * API types */ /* Forward declarations */ struct cc_context_f; typedef struct cc_context_f cc_context_f; struct cc_ccache_f; typedef struct cc_ccache_f cc_ccache_f; struct cc_ccache_iterator_f; typedef struct cc_ccache_iterator_f cc_ccache_iterator_f; struct cc_ccache_iterator_f; typedef struct cc_credentials_iterator_f cc_credentials_iterator_f; struct cc_string_f; typedef struct cc_string_f cc_string_f; struct cc_credentials_f; typedef struct cc_credentials_f cc_credentials_f; /* Credentials types */ enum { /* Make sure all of these are multiples of four (for alignment sanity) */ cc_v4_name_size = 40, cc_v4_instance_size = 40, cc_v4_realm_size = 40, cc_v4_ticket_size = 1254 }; enum cc_string_to_key_type { cc_v4_stk_afs = 0, cc_v4_stk_des = 1, cc_v4_stk_columbia_special = 2, cc_v4_stk_unknown = 3 }; struct cc_credentials_v4_t { cc_uint32 version; char principal [cc_v4_name_size]; char principal_instance [cc_v4_instance_size]; char service [cc_v4_name_size]; char service_instance [cc_v4_instance_size]; char realm [cc_v4_realm_size]; unsigned char session_key [8]; cc_int32 kvno; cc_int32 string_to_key_type; cc_time_t issue_date; cc_int32 lifetime; cc_uint32 address; cc_int32 ticket_size; unsigned char ticket [cc_v4_ticket_size]; }; typedef struct cc_credentials_v4_t cc_credentials_v4_t; struct cc_data { cc_uint32 type; cc_uint32 length; void* data; }; typedef struct cc_data cc_data; struct cc_credentials_v5_t { char* client; char* server; cc_data keyblock; cc_time_t authtime; cc_time_t starttime; cc_time_t endtime; cc_time_t renew_till; cc_uint32 is_skey; cc_uint32 ticket_flags; cc_data** addresses; cc_data ticket; cc_data second_ticket; cc_data** authdata; }; typedef struct cc_credentials_v5_t cc_credentials_v5_t; struct cc_credentials_union { cc_int32 version; union { cc_credentials_v4_t* credentials_v4; cc_credentials_v5_t* credentials_v5; } credentials; }; typedef struct cc_credentials_union cc_credentials_union; /* Exposed parts */ struct cc_context_d { const cc_context_f* functions; #if TARGET_OS_MAC const cc_context_f* otherFunctions; #endif }; typedef struct cc_context_d cc_context_d; typedef cc_context_d* cc_context_t; struct cc_ccache_d { const cc_ccache_f* functions; #if TARGET_OS_MAC const cc_ccache_f* otherFunctions; #endif }; typedef struct cc_ccache_d cc_ccache_d; typedef cc_ccache_d* cc_ccache_t; struct cc_ccache_iterator_d { const cc_ccache_iterator_f* functions; #if TARGET_OS_MAC const cc_ccache_iterator_f* otherFunctions; #endif }; typedef struct cc_ccache_iterator_d cc_ccache_iterator_d; typedef cc_ccache_iterator_d* cc_ccache_iterator_t; struct cc_credentials_iterator_d { const cc_credentials_iterator_f* functions; #if TARGET_OS_MAC const cc_credentials_iterator_f* otherFunctions; #endif }; typedef struct cc_credentials_iterator_d cc_credentials_iterator_d; typedef cc_credentials_iterator_d* cc_credentials_iterator_t; struct cc_string_d { const char* data; const cc_string_f* functions; #if TARGET_OS_MAC const cc_string_f* otherFunctions; #endif }; typedef struct cc_string_d cc_string_d; typedef cc_string_d* cc_string_t; struct cc_credentials_d { const cc_credentials_union* data; const cc_credentials_f* functions; #if TARGET_OS_MAC const cc_credentials_f* otherFunctions; #endif }; typedef struct cc_credentials_d cc_credentials_d; typedef cc_credentials_d* cc_credentials_t; /* Function pointer structs */ struct cc_context_f { cc_int32 (*release) ( cc_context_t context); cc_int32 (*get_change_time) ( cc_context_t context, cc_time_t* time); cc_int32 (*get_default_ccache_name) ( cc_context_t context, cc_string_t* name); cc_int32 (*open_ccache) ( cc_context_t context, const char* name, cc_ccache_t* ccache); cc_int32 (*open_default_ccache) ( cc_context_t context, cc_ccache_t* ccache); cc_int32 (*create_ccache) ( cc_context_t context, const char* name, cc_uint32 cred_vers, const char* principal, cc_ccache_t* ccache); cc_int32 (*create_default_ccache) ( cc_context_t context, cc_uint32 cred_vers, const char* principal, cc_ccache_t* ccache); cc_int32 (*create_new_ccache) ( cc_context_t context, cc_uint32 cred_vers, const char* principal, cc_ccache_t* ccache); cc_int32 (*new_ccache_iterator) ( cc_context_t context, cc_ccache_iterator_t* iterator); cc_int32 (*lock) ( cc_context_t context, cc_uint32 lock_type, cc_uint32 block); cc_int32 (*unlock) ( cc_context_t context); cc_int32 (*compare) ( cc_context_t context, cc_context_t compare_to, cc_uint32* equal); }; struct cc_ccache_f { cc_int32 (*release) ( cc_ccache_t ccache); cc_int32 (*destroy) ( cc_ccache_t ccache); cc_int32 (*set_default) ( cc_ccache_t ccache); cc_int32 (*get_credentials_version) ( cc_ccache_t ccache, cc_uint32* credentials_version); cc_int32 (*get_name) ( cc_ccache_t ccache, cc_string_t* name); cc_int32 (*get_principal) ( cc_ccache_t ccache, cc_uint32 credentials_version, cc_string_t* principal); cc_int32 (*set_principal) ( cc_ccache_t ccache, cc_uint32 credentials_version, const char* principal); cc_int32 (*store_credentials) ( cc_ccache_t ccache, const cc_credentials_union* credentials); cc_int32 (*remove_credentials) ( cc_ccache_t ccache, cc_credentials_t credentials); cc_int32 (*new_credentials_iterator) ( cc_ccache_t ccache, cc_credentials_iterator_t* iterator); cc_int32 (*move) ( cc_ccache_t source, cc_ccache_t destination); cc_int32 (*lock) ( cc_ccache_t ccache, cc_uint32 block, cc_uint32 lock_type); cc_int32 (*unlock) ( cc_ccache_t ccache); cc_int32 (*get_last_default_time) ( cc_ccache_t ccache, cc_time_t* time); cc_int32 (*get_change_time) ( cc_ccache_t ccache, cc_time_t* time); cc_int32 (*compare) ( cc_ccache_t ccache, cc_ccache_t compare_to, cc_uint32* equal); }; struct cc_string_f { cc_int32 (*release) ( cc_string_t string); }; struct cc_credentials_f { cc_int32 (*release) ( cc_credentials_t credentials); cc_int32 (*compare) ( cc_credentials_t credentials, cc_credentials_t compare_to, cc_uint32* equal); }; struct cc_ccache_iterator_f { cc_int32 (*release) ( cc_ccache_iterator_t iter); cc_int32 (*next) ( cc_ccache_iterator_t iter, cc_ccache_t* ccache); }; struct cc_credentials_iterator_f { cc_int32 (*release) ( cc_credentials_iterator_t iter); cc_int32 (*next) ( cc_credentials_iterator_t iter, cc_credentials_t* ccache); }; /* * API functions */ cc_int32 cc_initialize ( cc_context_t* outContext, cc_int32 inVersion, cc_int32* outSupportedVersion, char const** outVendor); /* * Convenience macros */ #de (…)

Completed in 132 milliseconds