/macosx-10.10/vim-55/runtime/syntax/ |
H A D | pf.vim | 20 syn keyword pfService auth bgp domain finger ftp http https ident
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | curl_ntlm_wb.c | 303 struct auth *authp;
|
H A D | http_digest.c | 186 /* tokenize the list and choose auth if possible, use a temporary 193 if(Curl_raw_equal(token, "auth")) { 196 else if(Curl_raw_equal(token, "auth-int")) { 202 /*select only auth o auth-int. Otherwise, ignore*/ 204 d->qop = strdup("auth"); 209 d->qop = strdup("auth-int"); 320 struct auth *authp; 413 If the "qop" directive's value is "auth" or is unspecified, then A2 is: 417 If the "qop" value is "auth [all...] |
H A D | urldata.h | 449 /* when doing Negotiate we first need to receive an auth token and then we 502 bool authneg; /* TRUE when the auth phase has started, which means 503 that we are creating a request with an auth header, 504 but it is not the final request in the auth 528 connection in a CONNECT request with auth, so 1085 unsigned long proxyauthavail; /* what proxy auth types were announced */ 1086 unsigned long httpauthavail; /* what host auth types were announced */ 1186 struct auth { struct 1192 bool done; /* TRUE when the auth phase is done and ready to do the *actual* 1194 bool multi; /* TRUE if this is not yet authenticated but within the auth [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslContext.c | 1426 SSLAuthenticate auth) 1435 ctx->clientAuth = auth; 1436 switch(auth) { 1450 SSLAuthenticate *auth) /* RETURNED */ 1452 if(ctx == NULL || auth == NULL) { 1455 *auth = ctx->clientAuth; 1493 /* changing the client cert invalidates negotiated auth type */ 2355 * allowed auth types. The x509Requested flag indicates "we 1425 SSLSetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate auth) argument 1449 SSLGetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate *auth) argument
|
H A D | SecureTransportPriv.h | 147 SSLAuthenticate *auth); // RETURNED 391 * the negotiated auth type otherwise.
|
H A D | SecureTransport.h | 1117 SSLAuthenticate auth)
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslContext.c | 1426 SSLAuthenticate auth) 1435 ctx->clientAuth = auth; 1436 switch(auth) { 1450 SSLAuthenticate *auth) /* RETURNED */ 1452 if(ctx == NULL || auth == NULL) { 1455 *auth = ctx->clientAuth; 1493 /* changing the client cert invalidates negotiated auth type */ 2355 * allowed auth types. The x509Requested flag indicates "we 1425 SSLSetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate auth) argument 1449 SSLGetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate *auth) argument
|
H A D | SecureTransportPriv.h | 147 SSLAuthenticate *auth); // RETURNED 391 * the negotiated auth type otherwise.
|
H A D | SecureTransport.h | 1117 SSLAuthenticate auth)
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslContext.c | 1426 SSLAuthenticate auth) 1435 ctx->clientAuth = auth; 1436 switch(auth) { 1450 SSLAuthenticate *auth) /* RETURNED */ 1452 if(ctx == NULL || auth == NULL) { 1455 *auth = ctx->clientAuth; 1493 /* changing the client cert invalidates negotiated auth type */ 2355 * allowed auth types. The x509Requested flag indicates "we 1425 SSLSetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate auth) argument 1449 SSLGetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate *auth) argument
|
H A D | SecureTransportPriv.h | 147 SSLAuthenticate *auth); // RETURNED 391 * the negotiated auth type otherwise.
|
H A D | SecureTransport.h | 1117 SSLAuthenticate auth)
|
/macosx-10.10/ruby-106/ruby/lib/net/ |
H A D | imap.rb | 415 format('unknown auth type - "%s"', auth_type) 3464 raise Error, "Server does not support auth (qop = #{sparams['qop'].join(',')})" unless sparams['qop'].include?("auth") 3472 :qop => 'auth', 3487 a2 << ":00000000000000000000000000000000" if response[:qop] and response[:qop] =~ /^auth-(?:conf|int)$/ 3600 $auth = "login" 3611 --auth=AUTH specifies auth type 3657 ['--auth', GetoptLong::REQUIRED_ARGUMENT], 3667 when "--auth" [all...] |
/macosx-10.10/apr-32/apr-util/apr-util/dbd/ |
H A D | apr_dbd_oracle.c | 128 OCISession *auth; member in struct:apr_dbd_t 556 ret->status = OCIHandleAlloc(dbd_oracle_env, (dvoid**)&ret->auth, 563 printf("OPEN ERROR %d (alloc auth): %s\n", ret->status, ret->buf); 576 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[0].value, 596 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[1].value, 616 ret->status = OCISessionBegin(ret->svc, ret->err, ret->auth, 636 ret->status = OCIAttrSet(ret->svc, OCI_HTYPE_SVCCTX, ret->auth, 0, 2103 switch (OCISessionEnd(handle->svc, handle->err, handle->auth, 2113 switch (OCIHandleFree((dvoid *) handle->auth, (ub4) OCI_HTYPE_SESSION)) {
|
/macosx-10.10/emacs-93/emacs/lisp/ |
H A D | server.el | 108 (defcustom server-auth-dir "~/.emacs.d/server/" 113 (put 'server-auth-dir 'risky-local-variable t) 326 (let* ((server-dir (if server-use-tcp server-auth-dir server-socket-dir)) 357 (let ((auth-key 359 ;; The auth key is a 64-byte string of random chars in the 362 collect (+ 33 (random 94)) into auth 363 finally return (concat auth)))) 364 (process-put server-process :auth-key auth-key) 371 "\n" auth [all...] |
/macosx-10.10/ntp-92/include/ |
H A D | ntp_request.h | 139 char mac[MAX_MAC_LEN-sizeof(keyid_t)]; /* (optional) auth code */ 149 char mac[MAX_MAC_LEN-sizeof(keyid_t)]; /* (optional) auth code */ 214 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
|
/macosx-10.10/Libinfo-459/xcodescripts/ |
H A D | install_files.sh | 36 rpc.subproj/auth.h \
|
/macosx-10.10/ntp-92/ntpdc/ |
H A D | ntpdc.c | 898 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a 910 int auth, 942 if (!auth || (keyid_entered && info_auth_keyid == 0)) { 1012 int auth, 1058 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata); 1691 * my_delay - set delay for auth requests 907 sendrequest( int implcode, int reqcode, int auth, u_int qitems, size_t qsize, char *qdata ) argument 1009 doquery( int implcode, int reqcode, int auth, int qitems, int qsize, char *qdata, int *ritems, int *rsize, char **rdata, int quiet_mask, int esize ) argument
|
/macosx-10.10/smb-759.0/lib/ |
H A D | libtest.c | 74 uint64_t auth = 0; local 81 auth = (auth << 8) | sidptr->sid_authority[i]; 82 s += snprintf(s, MAX_SID_PRINTBUFFER, "S-%u-%llu", sidptr->sid_kind, auth);
|
/macosx-10.10/cups-408/cups/cups/ |
H A D | Makefile | 36 auth.o \ 588 http.h ipp.h auth.c getdevices.c getputfile.c encode.c \ 637 http.h ipp.h auth.c getdevices.c getputfile.c encode.c \
|
/macosx-10.10/curl-83.1.2/curl/tests/server/ |
H A D | sws.c | 100 bool auth; /* Authorization header present in the incoming request */ member in struct:httprequest 715 if(!req->auth && strstr(req->reqbuf, "Authorization:")) { 716 req->auth = TRUE; /* Authorization: header present! */ 783 /* If authentication is required and no auth was provided, end now. This 787 if(req->auth_req && !req->auth) { 788 logmsg("Return early due to auth requested by none provided"); 870 req->auth = FALSE;
|
/macosx-10.10/CPANInternal-159.1/Mail-Sender-0.8.22/ |
H A D | Sender.pm | 214 my @auth = split /\s+/, uc($self->{'supports'}{AUTH});
215 $self->{'auth_protocols'} = {map {$_, 1} @auth};
236 my $auth = uc( $self->{'auth'}) || 'LOGIN';
237 if (! $self->{'auth_protocols'}->{$auth}) {
238 return $self->Error(INVALIDAUTH($auth));
247 $auth =~ tr/a-zA-Z0-9_/_/c; # change all characters except letters, numbers and underscores to underscores
249 &{"Mail::Sender::Auth::".$auth}($self);
344 (my $auth = $Mail::Sender::Auth::AUTOLOAD) =~ s/.*:://;
350 return $self->Error( UNKNOWNAUTH($auth));
[all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | spc.c | 572 static const char *auth = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n\ 614 (uint8_t*)auth, strlen(auth), kCFAllocatorNull);
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/ldap/ |
H A D | ldap.tcl | 900 set auth 0 911 set auth 1 918 return $auth
|