Searched refs:auth (Results 226 - 250 of 354) sorted by relevance

1234567891011>>

/macosx-10.9.5/remote_cmds-41.90.1/telnet.tproj/
H A Dmain.c53 #include <libtelnet/auth.h>
/macosx-10.9.5/tcl-102/tcl_ext/tclsoap/tclsoap/cgi-bin/soap/
H A Dwebservice.tcl34 auth::map_lock
36 auth::map_parse
45 set actiontbl($action) [auth::safeaction $action]
50 auth::authorise $email $passwd new
60 set actiontbl($action) [auth::safeaction $action]
63 auth::map_update
65 auth::map_unlock
73 auth::map_lock
74 auth::map_parse
75 auth
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/
H A Dpolicyengine.cpp625 CFRef<CFMutableDictionaryRef> auth = makeCFMutableDictionary(); local
627 cfadd(auth, "{%O=%s}", kSecAssessmentAssessmentSource, label);
629 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityRow, CFTempNumber(row));
631 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityOverride, kDisabledOverride);
633 CFDictionaryAddValue(auth, kSecAssessmentAssessmentFromCache, cacheInfo);
635 CFDictionaryAddValue(auth, kSecAssessmentAssessmentWeakSignature, kCFBooleanTrue);
636 CFDictionaryReplaceValue(parent, kSecAssessmentAssessmentAuthority, auth);
638 CFDictionaryAddValue(parent, kSecAssessmentAssessmentAuthority, auth);
H A DSecAssessment.cpp286 if (CFStringRef auth = CFStringRef(CFDictionaryGetValue(authdict, kSecAssessmentAssessmentSource)))
287 authority = cfString(auth);
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/
H A Dpolicyengine.cpp625 CFRef<CFMutableDictionaryRef> auth = makeCFMutableDictionary(); local
627 cfadd(auth, "{%O=%s}", kSecAssessmentAssessmentSource, label);
629 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityRow, CFTempNumber(row));
631 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityOverride, kDisabledOverride);
633 CFDictionaryAddValue(auth, kSecAssessmentAssessmentFromCache, cacheInfo);
635 CFDictionaryAddValue(auth, kSecAssessmentAssessmentWeakSignature, kCFBooleanTrue);
636 CFDictionaryReplaceValue(parent, kSecAssessmentAssessmentAuthority, auth);
638 CFDictionaryAddValue(parent, kSecAssessmentAssessmentAuthority, auth);
H A DSecAssessment.cpp286 if (CFStringRef auth = CFStringRef(CFDictionaryGetValue(authdict, kSecAssessmentAssessmentSource)))
287 authority = cfString(auth);
/macosx-10.9.5/sudo-72/src/
H A Dsample.sudoers11 Defaults syslog=auth
/macosx-10.9.5/tcl-102/tcl_ext/tclvfs/tclvfs/library/
H A Dhttpvfs.tcl49 set auth "Basic [base64::encode $user:$passwd]"
50 set headers [list Authorization $auth]
230 # vfs::http will do HTTP basic auth on their existence,
/macosx-10.9.5/vim-53/runtime/syntax/
H A Dfetchmail.vim32 \ auth[enticate] timeout envelope qvirtual aka
H A Dpamconf.vim27 syn keyword pamconfType account auth password session
/macosx-10.9.5/cups-372.4/cups/scheduler/
H A Ddirsvc.c354 air_str[1024], /* auth-info-required string buffer */
1521 * 'get_auth_info_required()' - Get the auth-info-required value to advertise.
1530 cupsd_location_t *auth; /* Pointer to authentication element */ local
1535 * If auth-info-required is set for this printer, return that...
1567 if ((auth = cupsdFindBest(resource, HTTP_POST)) == NULL ||
1568 auth->type == CUPSD_AUTH_NONE)
1569 auth = cupsdFindPolicyOp(p->op_policy_ptr, IPP_PRINT_JOB);
1571 if (auth)
1575 if ((auth_type = auth->type) == CUPSD_AUTH_DEFAULT)
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/mime/
H A Dsmtp.tcl790 if {![info exists state(auth)]
812 if {[info exists state(auth)] && $state(auth)} {
813 if {$state(auth) == 1} {
818 # security layer -- these should set state(auth)
866 set state(auth) 0
882 set state(auth) 1
/macosx-10.9.5/dcerpc-58/dcerpc/
H A Dconfigure.in537 RPC_ARG_DEFINE(dummyauth, AUTH_DUMMY, no,Include the DCE dummy auth service)
548 # gss_negotiate auth module to yes. Otherwise, default it to no and
558 RPC_ARG_DEFINE(gss_negotiate, AUTH_GSS_NEGOTIATE, ${rpc_default_gss_negotiate}, Include the DCE gss_negotiate auth service)
561 AC_DEFINE([ENABLE_AUTH_GSS_NEGOTIATE], [], [Enable GSS negotiate auth mechanism])
567 RPC_ARG_DEFINE(schannel, AUTH_SCHANNEL, ${ac_cv_lib_schannel_schn_wrap}, Include the schannel auth service)
570 AC_DEFINE([ENABLE_AUTH_SCHANNEL], [], [Enable schannel auth mechanism])
/macosx-10.9.5/lukemftp-13.92.1/tnftp/src/
H A Dfetch.c502 char *volatile auth; local
521 auth = location = message = NULL;
992 "skipping unknown auth scheme `%s'\n",
996 FREEPTR(auth);
997 auth = ftp_strdup(token);
998 DPRINTF("parsed auth as `%s'\n", cp);
1060 if (EMPTYSTRING(auth)) {
1079 if (auth_url(auth, authp, auser, apass) == 0) {
1302 FREEPTR(auth);
/macosx-10.9.5/curl-78.94.1/curl/lib/
H A Dhttp.c279 static bool pickoneauth(struct auth *pick)
426 * which one (if any) to use. It will set 'newurl' if an auth method was
460 /* In case this is GSS auth, the newurl field is already allocated so
503 * Output the correct authentication header depending on the auth type
508 struct auth *authstatus,
514 const char *auth=NULL; local
530 auth="GSS-Negotiate";
541 auth="NTLM";
550 auth="NTLM_WB";
559 auth
[all...]
/macosx-10.9.5/MITKerberosShim-62.1/
H A Dkll.c146 AuthorizationRef auth; local
165 ret = AuthorizationCreate(NULL, NULL, kAuthorizationFlagDefaults, &auth);
212 ret = AuthorizationCopyRights(auth, &rights, &env, authFlags, NULL);
217 ret = AuthorizationCopyInfo(auth, NULL, &info);
236 AuthorizationFree(auth, kAuthorizationFlagDestroyRights);
/macosx-10.9.5/curl-78.94.1/curl/tests/server/
H A Drtspd.c103 bool auth; /* Authorization header present in the incoming request */ member in struct:httprequest
635 if(!req->auth && strstr(req->reqbuf, "Authorization:")) {
636 req->auth = TRUE; /* Authorization: header present! */
701 /* If authentication is required and no auth was provided, end now. This
705 if(req->auth_req && !req->auth)
796 req->auth = FALSE;
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/
H A Dssl-42-ciphers.c355 SSLAuthenticate auth; local
357 require_noerr(SSLGetClientSideAuthenticate(ctx, &auth), out);
358 require(auth==kAlwaysAuthenticate, out);
406 require_string(!got_server_auth, out, "second server auth");
407 require_string(!got_client_cert_req, out, "got client cert req before server auth");
448 require_string(got_server_auth, out, "didn't get server auth first");
470 require_string(got_server_auth, out, "never got server auth");
627 plan_tests(2 * 2 * 2 * nprotos * (ciphers_len-1)/* client auth on/off * #configs * #ciphers */
640 TODO: allow secure transport to also defer client side auth to client
/macosx-10.9.5/Security-55471.14.18/tlsnke/tlsnketest/
H A Dst_test.c382 SSLAuthenticate auth; local
384 require_noerr(SSLGetClientSideAuthenticate(ctx, &auth), out);
385 require(auth==kAlwaysAuthenticate, out);
456 require_string(!got_server_auth, out, "second server auth");
457 require_string(!got_client_cert_req, out, "got client cert req before server auth");
498 require_string(got_server_auth, out, "didn't get server auth first");
520 require_string(got_server_auth, out, "never got server auth");
/macosx-10.9.5/Libnotify-121.20.1/
H A Dlibnotify.c587 int auth; local
593 auth = _internal_check_access(ns, n->name, uid, gid, NOTIFY_ACCESS_WRITE);
594 if (auth != 0) return NOTIFY_STATUS_NOT_AUTHORIZED;
1095 int auth = _internal_check_access(ns, n->name, uid, gid, NOTIFY_ACCESS_READ); local
1096 if (auth != 0)
1116 int auth; local
1130 auth = _internal_check_access(ns, n->name, uid, gid, NOTIFY_ACCESS_WRITE);
1131 if (auth != 0)
/macosx-10.9.5/apache-786.1/httpd/support/
H A Dab.c43 ** - Added Cookie, Arbitrary header and auth support. <dirkx@webweaving.org>, April 1999
298 *auth, /* optional (basic/uuencoded) auhentication */ variable
1623 cookie, auth, hdrs);
1636 cookie, auth,
2039 auth = "";
2157 auth = apr_pstrcat(cntxt, auth, "Authorization: Basic ", tmp,
2172 auth = apr_pstrcat(cntxt, auth, "Proxy-Authorization: Basic ",
/macosx-10.9.5/dcerpc-58/dcerpc/perf/
H A Dserver.c113 idl_boolean auth = false; /* should we check authentication? */
523 * Print out binding info (location and auth info) for a server binding. This
571 printf ("(can't get auth info - %s)\n", error_text (st));
719 auth = true;
112 idl_boolean auth = false; /* should we check authentication? */ variable
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/java/javax/security/auth/
H A DMakefile180 cd $(top_srcdir) && $(AUTOMAKE) --gnu --include-deps java/javax/security/auth/Makefile
278 subdir = java/javax/security/auth
/macosx-10.9.5/ruby-104/ruby/lib/net/
H A Dpop.rb566 @command.auth account, password
903 def auth(account, password) method in class:Net.POP3.POP3Command
/macosx-10.9.5/tcpdump-56/tcpdump/
H A Dprint-radius.c150 u_int8_t auth[16]; /* Authenticator */ member in struct:radius_hdr
928 printf("%02x", rad->auth[auth_idx] );

Completed in 184 milliseconds

1234567891011>>