/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/ |
H A D | gssauth.c | 821 static rpc_authn_protocol_id_elt_t auth[4] = { local 855 rpc__register_authn_protocol(auth, sizeof(auth)/sizeof(auth[0]));
|
H A D | schnauth.c | 219 /* setting auth info on binding handle means that we're initiating 239 static rpc_authn_protocol_id_elt_t auth[1] = { local 250 rpc__register_authn_protocol(auth, 1);
|
/macosx-10.9.5/ksh-20/ksh/src/cmd/INIT/ |
H A D | hurl.sh | 195 elif lynx ${authorize:+-auth "$authorize"} -source $url 2>/dev/null
|
/macosx-10.9.5/sudo-72/src/ |
H A D | getspwuid.c | 65 # include <auth.h> 71 * Exported for auth/secureware.c
|
/macosx-10.9.5/curl-78.94.1/curl/lib/ |
H A D | smtp.c | 933 char *auth = NULL; local 953 auth = aprintf("%s", data->set.str[STRING_MAIL_AUTH]); 956 auth = strdup("<>"); 958 if(!auth) { 971 Curl_safefree(auth); 978 if(!auth && !size) 981 else if(auth && !size) 983 "MAIL FROM:%s AUTH=%s", from, auth); 984 else if(auth && size) 986 "MAIL FROM:%s AUTH=%s SIZE=%s", from, auth, siz [all...] |
H A D | url.c | 517 set->ssh_auth_types = CURLSSH_AUTH_DEFAULT; /* defaults to any auth 1202 unsigned long auth = va_arg(param, unsigned long); local 1204 if(auth == CURLAUTH_NONE) { 1205 data->set.httpauth = auth; 1211 data->state.authhost.iestyle = (auth & CURLAUTH_DIGEST_IE)?TRUE:FALSE; 1213 if(auth & CURLAUTH_DIGEST_IE) { 1214 auth |= CURLAUTH_DIGEST; /* set standard digest bit */ 1215 auth &= ~CURLAUTH_DIGEST_IE; /* unset ie digest bit */ 1220 auth &= ~CURLAUTH_NTLM; /* no NTLM support */ 1221 auth 1283 unsigned long auth = va_arg(param, unsigned long); local [all...] |
H A D | curl_ntlm.c | 136 struct auth *authp;
|
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/lib/Net/LDAP/Control/ |
H A D | ProxyAuth.pm | 111 $auth = Net::LDAP::Control::ProxyAuth->new( authzID => 'dn:cn=me,ou=people,o=myorg.com' ); 117 control => [ $auth ],
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/data/ |
H A D | slapd-acl.conf | 61 by anonymous auth
|
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | tokendatabase.h | 140 void validate(AclAuthorization auth, const AccessCredentials *cred) argument 141 { TokenAcl::validate(auth, cred, &database()); }
|
/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | print-zephyr.c | 46 int auth; member in struct:z_packet 173 PARSE_FIELD_INT(z.auth);
|
/macosx-10.9.5/emacs-92/emacs/lisp/gnus/ |
H A D | imap.el | 100 ;; => auth 319 '((gssapi imap-gssapi-auth-p imap-gssapi-auth) 320 (kerberos4 imap-kerberos4-auth-p imap-kerberos4-auth) 321 (cram-md5 imap-cram-md5-p imap-cram-md5-auth) 322 (login imap-login-p imap-login-auth) 323 (anonymous imap-anonymous-p imap-anonymous-auth) 324 (digest-md5 imap-digest-md5-p imap-digest-md5-auth)) 348 imap-auth [all...] |
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/ |
H A D | Nameserver.pm | 190 my ($rcode, $ans, $auth, $add); 193 ($rcode, $ans, $auth, $add, $headermask) = 198 ($rcode, $ans, $auth, $add, $headermask) = 206 $reply->push("authority", @$auth) if $auth; 637 my ($rcode, @ans, @auth, @add); 656 return ($rcode, \@ans, \@auth, \@add, { aa => 1 });
|
/macosx-10.9.5/ppp-727.90.1/Authenticators/Radius/ |
H A D | main.c | 579 char auth[MD4_SIGNATURE_SIZE + 1]; local 715 len = rad_request_authenticator(h, auth, sizeof(auth)); 719 radius_decryptmppekey((char*)mppe_send_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len); 727 len = rad_request_authenticator(h, auth, sizeof(auth)); 731 radius_decryptmppekey((char*)mppe_recv_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len);
|
/macosx-10.9.5/ntp-88/ntpq/ |
H A D | ntpq-subs.c | 395 int auth, 407 return doquery(op, associd, auth, datalen, data, rstatus, 935 const char *auth; local 950 "\nind assid status conf reach auth condition last_event cnt\n"); 966 auth = "yes"; 968 auth = "none"; 976 auth = "ok "; 978 auth = "bad"; 980 auth = "none"; 1097 conf, reach, auth, conditio 391 doquerylist( struct varlist *vlist, int op, int associd, int auth, u_short *rstatus, int *dsize, char **datap ) argument [all...] |
/macosx-10.9.5/CPANInternal-140/Net-IP/ |
H A D | IP.pm | 766 # Subroutine auth 771 sub auth { subroutine 774 return ($self->{auth}) if defined($self->{auth}); 776 my $auth = ip_auth($self->ip, $self->version); 778 if (!$auth) { 784 $self->{auth} = $auth; 786 return ($self->{auth}); 1917 $ERROR = "Cannot get auth informatio [all...] |
/macosx-10.9.5/Security-55471.14.18/authd/ |
H A D | agent.c | 110 agent_create(engine_t engine, mechanism_t mech, auth_token_t auth, process_t proc, bool firstMech) argument 127 const audit_info_s *audit_info = auth_token_get_audit_info(auth); 160 mach_port_t newBootstrapPort = auth_token_get_creator_bootstrap(auth);
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/java/javax/security/auth/callback/ |
H A D | Makefile | 166 javasasldir = $(prefix)/lib/java/classes/sasl/javax/security/auth/callback 188 cd $(top_srcdir) && $(AUTOMAKE) --gnu --include-deps java/javax/security/auth/callback/Makefile 226 subdir = java/javax/security/auth/callback
|
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/ |
H A D | auth.c | 24 * auth.c - PPP authentication and phase control. 98 #define RCSID "$Id: auth.c,v 1.21.20.1 2006/04/17 18:37:14 callie Exp $" 250 * This is used to ensure that we don't start an auth-up/down 269 bool refuse_pap = 0; /* Don't wanna auth. ourselves with PAP */ 270 bool refuse_chap = 0; /* Don't wanna auth. ourselves with CHAP */ 271 bool refuse_eap = 0; /* Don't wanna auth. ourselves with EAP */ 273 bool refuse_mschap = 0; /* Don't wanna auth. ourselves with MS-CHAP */ 274 bool refuse_mschap_v2 = 0; /* Don't wanna auth. ourselves with MS-CHAPv2 */ 276 bool refuse_mschap = 1; /* Don't wanna auth. ourselves with MS-CHAP */ 277 bool refuse_mschap_v2 = 1; /* Don't wanna auth 721 int auth; local [all...] |
/macosx-10.9.5/Heimdal-323.92.1/appl/ftp/ftp/ |
H A D | security.c | 432 auth(char *auth_name) function 450 if(mech->auth) { 451 (*mech->auth)(app_data); 842 ret = (*(*m)->auth)(app_data, host);
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | krb5tgs.c | 1021 krb5_authenticator auth; local 1028 krb5_auth_con_getauthenticator(context, ac, &auth); 1029 if(auth->cksum == NULL){ 1040 !krb5_checksum_is_keyed(context, auth->cksum->cksumtype) 1043 !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) { 1045 auth->cksum->cksumtype); 1078 auth->cksum); 1088 free_Authenticator(auth); 1089 free(auth); 1278 krb5_authenticator auth; local [all...] |
/macosx-10.9.5/Libinfo-449.1.3/rpc.subproj/ |
H A D | clnt_perror.c | 70 #include <rpc/auth.h>
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | auth.h | 1 /* $OpenBSD: auth.h,v 1.72 2012/12/02 20:34:09 djm Exp $ */ 134 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); 146 #include "auth-pam.h"
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | EAPOLClientConfiguration.h | 310 AuthorizationRef auth);
|
/macosx-10.9.5/ntp-88/include/ |
H A D | ntp_config.h | 187 struct auth_node auth; member in struct:config_tree
|