Searched refs:auth (Results 226 - 250 of 314) sorted by relevance

1234567891011>>

/macosx-10.10/vim-55/runtime/syntax/
H A Dpf.vim20 syn keyword pfService auth bgp domain finger ftp http https ident
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dcurl_ntlm_wb.c303 struct auth *authp;
H A Dhttp_digest.c186 /* tokenize the list and choose auth if possible, use a temporary
193 if(Curl_raw_equal(token, "auth")) {
196 else if(Curl_raw_equal(token, "auth-int")) {
202 /*select only auth o auth-int. Otherwise, ignore*/
204 d->qop = strdup("auth");
209 d->qop = strdup("auth-int");
320 struct auth *authp;
413 If the "qop" directive's value is "auth" or is unspecified, then A2 is:
417 If the "qop" value is "auth
[all...]
H A Durldata.h449 /* when doing Negotiate we first need to receive an auth token and then we
502 bool authneg; /* TRUE when the auth phase has started, which means
503 that we are creating a request with an auth header,
504 but it is not the final request in the auth
528 connection in a CONNECT request with auth, so
1085 unsigned long proxyauthavail; /* what proxy auth types were announced */
1086 unsigned long httpauthavail; /* what host auth types were announced */
1186 struct auth { struct
1192 bool done; /* TRUE when the auth phase is done and ready to do the *actual*
1194 bool multi; /* TRUE if this is not yet authenticated but within the auth
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslContext.c1426 SSLAuthenticate auth)
1435 ctx->clientAuth = auth;
1436 switch(auth) {
1450 SSLAuthenticate *auth) /* RETURNED */
1452 if(ctx == NULL || auth == NULL) {
1455 *auth = ctx->clientAuth;
1493 /* changing the client cert invalidates negotiated auth type */
2355 * allowed auth types. The x509Requested flag indicates "we
1425 SSLSetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate auth) argument
1449 SSLGetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate *auth) argument
H A DSecureTransportPriv.h147 SSLAuthenticate *auth); // RETURNED
391 * the negotiated auth type otherwise.
H A DSecureTransport.h1117 SSLAuthenticate auth)
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslContext.c1426 SSLAuthenticate auth)
1435 ctx->clientAuth = auth;
1436 switch(auth) {
1450 SSLAuthenticate *auth) /* RETURNED */
1452 if(ctx == NULL || auth == NULL) {
1455 *auth = ctx->clientAuth;
1493 /* changing the client cert invalidates negotiated auth type */
2355 * allowed auth types. The x509Requested flag indicates "we
1425 SSLSetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate auth) argument
1449 SSLGetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate *auth) argument
H A DSecureTransportPriv.h147 SSLAuthenticate *auth); // RETURNED
391 * the negotiated auth type otherwise.
H A DSecureTransport.h1117 SSLAuthenticate auth)
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslContext.c1426 SSLAuthenticate auth)
1435 ctx->clientAuth = auth;
1436 switch(auth) {
1450 SSLAuthenticate *auth) /* RETURNED */
1452 if(ctx == NULL || auth == NULL) {
1455 *auth = ctx->clientAuth;
1493 /* changing the client cert invalidates negotiated auth type */
2355 * allowed auth types. The x509Requested flag indicates "we
1425 SSLSetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate auth) argument
1449 SSLGetClientSideAuthenticate(SSLContext *ctx, SSLAuthenticate *auth) argument
H A DSecureTransportPriv.h147 SSLAuthenticate *auth); // RETURNED
391 * the negotiated auth type otherwise.
H A DSecureTransport.h1117 SSLAuthenticate auth)
/macosx-10.10/ruby-106/ruby/lib/net/
H A Dimap.rb415 format('unknown auth type - "%s"', auth_type)
3464 raise Error, "Server does not support auth (qop = #{sparams['qop'].join(',')})" unless sparams['qop'].include?("auth")
3472 :qop => 'auth',
3487 a2 << ":00000000000000000000000000000000" if response[:qop] and response[:qop] =~ /^auth-(?:conf|int)$/
3600 $auth = "login"
3611 --auth=AUTH specifies auth type
3657 ['--auth', GetoptLong::REQUIRED_ARGUMENT],
3667 when "--auth"
[all...]
/macosx-10.10/apr-32/apr-util/apr-util/dbd/
H A Dapr_dbd_oracle.c128 OCISession *auth; member in struct:apr_dbd_t
556 ret->status = OCIHandleAlloc(dbd_oracle_env, (dvoid**)&ret->auth,
563 printf("OPEN ERROR %d (alloc auth): %s\n", ret->status, ret->buf);
576 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[0].value,
596 ret->status = OCIAttrSet(ret->auth, OCI_HTYPE_SESSION, fields[1].value,
616 ret->status = OCISessionBegin(ret->svc, ret->err, ret->auth,
636 ret->status = OCIAttrSet(ret->svc, OCI_HTYPE_SVCCTX, ret->auth, 0,
2103 switch (OCISessionEnd(handle->svc, handle->err, handle->auth,
2113 switch (OCIHandleFree((dvoid *) handle->auth, (ub4) OCI_HTYPE_SESSION)) {
/macosx-10.10/emacs-93/emacs/lisp/
H A Dserver.el108 (defcustom server-auth-dir "~/.emacs.d/server/"
113 (put 'server-auth-dir 'risky-local-variable t)
326 (let* ((server-dir (if server-use-tcp server-auth-dir server-socket-dir))
357 (let ((auth-key
359 ;; The auth key is a 64-byte string of random chars in the
362 collect (+ 33 (random 94)) into auth
363 finally return (concat auth))))
364 (process-put server-process :auth-key auth-key)
371 "\n" auth
[all...]
/macosx-10.10/ntp-92/include/
H A Dntp_request.h139 char mac[MAX_MAC_LEN-sizeof(keyid_t)]; /* (optional) auth code */
149 char mac[MAX_MAC_LEN-sizeof(keyid_t)]; /* (optional) auth code */
214 #define AUTH_SEQ(auth, seq) ((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
/macosx-10.10/Libinfo-459/xcodescripts/
H A Dinstall_files.sh36 rpc.subproj/auth.h \
/macosx-10.10/ntp-92/ntpdc/
H A Dntpdc.c898 * REQ_LEN_NOMAC + 4 + 16 with the auth bit enabled. When using a
910 int auth,
942 if (!auth || (keyid_entered && info_auth_keyid == 0)) {
1012 int auth,
1058 res = sendrequest(implcode, reqcode, auth, qitems, qsize, qdata);
1691 * my_delay - set delay for auth requests
907 sendrequest( int implcode, int reqcode, int auth, u_int qitems, size_t qsize, char *qdata ) argument
1009 doquery( int implcode, int reqcode, int auth, int qitems, int qsize, char *qdata, int *ritems, int *rsize, char **rdata, int quiet_mask, int esize ) argument
/macosx-10.10/smb-759.0/lib/
H A Dlibtest.c74 uint64_t auth = 0; local
81 auth = (auth << 8) | sidptr->sid_authority[i];
82 s += snprintf(s, MAX_SID_PRINTBUFFER, "S-%u-%llu", sidptr->sid_kind, auth);
/macosx-10.10/cups-408/cups/cups/
H A DMakefile36 auth.o \
588 http.h ipp.h auth.c getdevices.c getputfile.c encode.c \
637 http.h ipp.h auth.c getdevices.c getputfile.c encode.c \
/macosx-10.10/curl-83.1.2/curl/tests/server/
H A Dsws.c100 bool auth; /* Authorization header present in the incoming request */ member in struct:httprequest
715 if(!req->auth && strstr(req->reqbuf, "Authorization:")) {
716 req->auth = TRUE; /* Authorization: header present! */
783 /* If authentication is required and no auth was provided, end now. This
787 if(req->auth_req && !req->auth) {
788 logmsg("Return early due to auth requested by none provided");
870 req->auth = FALSE;
/macosx-10.10/CPANInternal-159.1/Mail-Sender-0.8.22/
H A DSender.pm214 my @auth = split /\s+/, uc($self->{'supports'}{AUTH});
215 $self->{'auth_protocols'} = {map {$_, 1} @auth};
236 my $auth = uc( $self->{'auth'}) || 'LOGIN';
237 if (! $self->{'auth_protocols'}->{$auth}) {
238 return $self->Error(INVALIDAUTH($auth));
247 $auth =~ tr/a-zA-Z0-9_/_/c; # change all characters except letters, numbers and underscores to underscores
249 &{"Mail::Sender::Auth::".$auth}($self);
344 (my $auth = $Mail::Sender::Auth::AUTOLOAD) =~ s/.*:://;
350 return $self->Error( UNKNOWNAUTH($auth));
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/
H A Dspc.c572 static const char *auth = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n\
614 (uint8_t*)auth, strlen(auth), kCFAllocatorNull);
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/ldap/
H A Dldap.tcl900 set auth 0
911 set auth 1
918 return $auth

Completed in 164 milliseconds

1234567891011>>