/macosx-10.9.5/remote_cmds-41.90.1/telnet.tproj/ |
H A D | main.c | 53 #include <libtelnet/auth.h>
|
/macosx-10.9.5/tcl-102/tcl_ext/tclsoap/tclsoap/cgi-bin/soap/ |
H A D | webservice.tcl | 34 auth::map_lock 36 auth::map_parse 45 set actiontbl($action) [auth::safeaction $action] 50 auth::authorise $email $passwd new 60 set actiontbl($action) [auth::safeaction $action] 63 auth::map_update 65 auth::map_unlock 73 auth::map_lock 74 auth::map_parse 75 auth [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | policyengine.cpp | 625 CFRef<CFMutableDictionaryRef> auth = makeCFMutableDictionary(); local 627 cfadd(auth, "{%O=%s}", kSecAssessmentAssessmentSource, label); 629 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityRow, CFTempNumber(row)); 631 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityOverride, kDisabledOverride); 633 CFDictionaryAddValue(auth, kSecAssessmentAssessmentFromCache, cacheInfo); 635 CFDictionaryAddValue(auth, kSecAssessmentAssessmentWeakSignature, kCFBooleanTrue); 636 CFDictionaryReplaceValue(parent, kSecAssessmentAssessmentAuthority, auth); 638 CFDictionaryAddValue(parent, kSecAssessmentAssessmentAuthority, auth);
|
H A D | SecAssessment.cpp | 286 if (CFStringRef auth = CFStringRef(CFDictionaryGetValue(authdict, kSecAssessmentAssessmentSource))) 287 authority = cfString(auth);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | policyengine.cpp | 625 CFRef<CFMutableDictionaryRef> auth = makeCFMutableDictionary(); local 627 cfadd(auth, "{%O=%s}", kSecAssessmentAssessmentSource, label); 629 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityRow, CFTempNumber(row)); 631 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityOverride, kDisabledOverride); 633 CFDictionaryAddValue(auth, kSecAssessmentAssessmentFromCache, cacheInfo); 635 CFDictionaryAddValue(auth, kSecAssessmentAssessmentWeakSignature, kCFBooleanTrue); 636 CFDictionaryReplaceValue(parent, kSecAssessmentAssessmentAuthority, auth); 638 CFDictionaryAddValue(parent, kSecAssessmentAssessmentAuthority, auth);
|
H A D | SecAssessment.cpp | 286 if (CFStringRef auth = CFStringRef(CFDictionaryGetValue(authdict, kSecAssessmentAssessmentSource))) 287 authority = cfString(auth);
|
/macosx-10.9.5/sudo-72/src/ |
H A D | sample.sudoers | 11 Defaults syslog=auth
|
/macosx-10.9.5/tcl-102/tcl_ext/tclvfs/tclvfs/library/ |
H A D | httpvfs.tcl | 49 set auth "Basic [base64::encode $user:$passwd]" 50 set headers [list Authorization $auth] 230 # vfs::http will do HTTP basic auth on their existence,
|
/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | fetchmail.vim | 32 \ auth[enticate] timeout envelope qvirtual aka
|
H A D | pamconf.vim | 27 syn keyword pamconfType account auth password session
|
/macosx-10.9.5/cups-372.4/cups/scheduler/ |
H A D | dirsvc.c | 354 air_str[1024], /* auth-info-required string buffer */ 1521 * 'get_auth_info_required()' - Get the auth-info-required value to advertise. 1530 cupsd_location_t *auth; /* Pointer to authentication element */ local 1535 * If auth-info-required is set for this printer, return that... 1567 if ((auth = cupsdFindBest(resource, HTTP_POST)) == NULL || 1568 auth->type == CUPSD_AUTH_NONE) 1569 auth = cupsdFindPolicyOp(p->op_policy_ptr, IPP_PRINT_JOB); 1571 if (auth) 1575 if ((auth_type = auth->type) == CUPSD_AUTH_DEFAULT)
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/mime/ |
H A D | smtp.tcl | 790 if {![info exists state(auth)] 812 if {[info exists state(auth)] && $state(auth)} { 813 if {$state(auth) == 1} { 818 # security layer -- these should set state(auth) 866 set state(auth) 0 882 set state(auth) 1
|
/macosx-10.9.5/dcerpc-58/dcerpc/ |
H A D | configure.in | 537 RPC_ARG_DEFINE(dummyauth, AUTH_DUMMY, no,Include the DCE dummy auth service) 548 # gss_negotiate auth module to yes. Otherwise, default it to no and 558 RPC_ARG_DEFINE(gss_negotiate, AUTH_GSS_NEGOTIATE, ${rpc_default_gss_negotiate}, Include the DCE gss_negotiate auth service) 561 AC_DEFINE([ENABLE_AUTH_GSS_NEGOTIATE], [], [Enable GSS negotiate auth mechanism]) 567 RPC_ARG_DEFINE(schannel, AUTH_SCHANNEL, ${ac_cv_lib_schannel_schn_wrap}, Include the schannel auth service) 570 AC_DEFINE([ENABLE_AUTH_SCHANNEL], [], [Enable schannel auth mechanism])
|
/macosx-10.9.5/lukemftp-13.92.1/tnftp/src/ |
H A D | fetch.c | 502 char *volatile auth; local 521 auth = location = message = NULL; 992 "skipping unknown auth scheme `%s'\n", 996 FREEPTR(auth); 997 auth = ftp_strdup(token); 998 DPRINTF("parsed auth as `%s'\n", cp); 1060 if (EMPTYSTRING(auth)) { 1079 if (auth_url(auth, authp, auser, apass) == 0) { 1302 FREEPTR(auth);
|
/macosx-10.9.5/curl-78.94.1/curl/lib/ |
H A D | http.c | 279 static bool pickoneauth(struct auth *pick) 426 * which one (if any) to use. It will set 'newurl' if an auth method was 460 /* In case this is GSS auth, the newurl field is already allocated so 503 * Output the correct authentication header depending on the auth type 508 struct auth *authstatus, 514 const char *auth=NULL; local 530 auth="GSS-Negotiate"; 541 auth="NTLM"; 550 auth="NTLM_WB"; 559 auth [all...] |
/macosx-10.9.5/MITKerberosShim-62.1/ |
H A D | kll.c | 146 AuthorizationRef auth; local 165 ret = AuthorizationCreate(NULL, NULL, kAuthorizationFlagDefaults, &auth); 212 ret = AuthorizationCopyRights(auth, &rights, &env, authFlags, NULL); 217 ret = AuthorizationCopyInfo(auth, NULL, &info); 236 AuthorizationFree(auth, kAuthorizationFlagDestroyRights);
|
/macosx-10.9.5/curl-78.94.1/curl/tests/server/ |
H A D | rtspd.c | 103 bool auth; /* Authorization header present in the incoming request */ member in struct:httprequest 635 if(!req->auth && strstr(req->reqbuf, "Authorization:")) { 636 req->auth = TRUE; /* Authorization: header present! */ 701 /* If authentication is required and no auth was provided, end now. This 705 if(req->auth_req && !req->auth) 796 req->auth = FALSE;
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | ssl-42-ciphers.c | 355 SSLAuthenticate auth; local 357 require_noerr(SSLGetClientSideAuthenticate(ctx, &auth), out); 358 require(auth==kAlwaysAuthenticate, out); 406 require_string(!got_server_auth, out, "second server auth"); 407 require_string(!got_client_cert_req, out, "got client cert req before server auth"); 448 require_string(got_server_auth, out, "didn't get server auth first"); 470 require_string(got_server_auth, out, "never got server auth"); 627 plan_tests(2 * 2 * 2 * nprotos * (ciphers_len-1)/* client auth on/off * #configs * #ciphers */ 640 TODO: allow secure transport to also defer client side auth to client
|
/macosx-10.9.5/Security-55471.14.18/tlsnke/tlsnketest/ |
H A D | st_test.c | 382 SSLAuthenticate auth; local 384 require_noerr(SSLGetClientSideAuthenticate(ctx, &auth), out); 385 require(auth==kAlwaysAuthenticate, out); 456 require_string(!got_server_auth, out, "second server auth"); 457 require_string(!got_client_cert_req, out, "got client cert req before server auth"); 498 require_string(got_server_auth, out, "didn't get server auth first"); 520 require_string(got_server_auth, out, "never got server auth");
|
/macosx-10.9.5/Libnotify-121.20.1/ |
H A D | libnotify.c | 587 int auth; local 593 auth = _internal_check_access(ns, n->name, uid, gid, NOTIFY_ACCESS_WRITE); 594 if (auth != 0) return NOTIFY_STATUS_NOT_AUTHORIZED; 1095 int auth = _internal_check_access(ns, n->name, uid, gid, NOTIFY_ACCESS_READ); local 1096 if (auth != 0) 1116 int auth; local 1130 auth = _internal_check_access(ns, n->name, uid, gid, NOTIFY_ACCESS_WRITE); 1131 if (auth != 0)
|
/macosx-10.9.5/apache-786.1/httpd/support/ |
H A D | ab.c | 43 ** - Added Cookie, Arbitrary header and auth support. <dirkx@webweaving.org>, April 1999 298 *auth, /* optional (basic/uuencoded) auhentication */ variable 1623 cookie, auth, hdrs); 1636 cookie, auth, 2039 auth = ""; 2157 auth = apr_pstrcat(cntxt, auth, "Authorization: Basic ", tmp, 2172 auth = apr_pstrcat(cntxt, auth, "Proxy-Authorization: Basic ",
|
/macosx-10.9.5/dcerpc-58/dcerpc/perf/ |
H A D | server.c | 113 idl_boolean auth = false; /* should we check authentication? */ 523 * Print out binding info (location and auth info) for a server binding. This 571 printf ("(can't get auth info - %s)\n", error_text (st)); 719 auth = true; 112 idl_boolean auth = false; /* should we check authentication? */ variable
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/java/javax/security/auth/ |
H A D | Makefile | 180 cd $(top_srcdir) && $(AUTOMAKE) --gnu --include-deps java/javax/security/auth/Makefile 278 subdir = java/javax/security/auth
|
/macosx-10.9.5/ruby-104/ruby/lib/net/ |
H A D | pop.rb | 566 @command.auth account, password 903 def auth(account, password) method in class:Net.POP3.POP3Command
|
/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | print-radius.c | 150 u_int8_t auth[16]; /* Authenticator */ member in struct:radius_hdr 928 printf("%02x", rad->auth[auth_idx] );
|