Searched refs:auth (Results 176 - 200 of 313) sorted by relevance

1234567891011>>

/macosx-10.10.1/ksh-23/ksh/src/cmd/INIT/
H A Dhurl.sh195 elif lynx ${authorize:+-auth "$authorize"} -source $url 2>/dev/null
/macosx-10.10.1/sudo-73/src/
H A Dgetspwuid.c65 # include <auth.h>
71 * Exported for auth/secureware.c
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/tests/data/
H A Dslapd-acl.conf61 by anonymous auth
/macosx-10.10.1/Security-57031.1.35/securityd/src/
H A Dtokendatabase.h140 void validate(AclAuthorization auth, const AccessCredentials *cred) argument
141 { TokenAcl::validate(auth, cred, &database()); }
/macosx-10.10.1/dcerpc-61/dcerpc/ncklib/
H A Dschnauth.c219 /* setting auth info on binding handle means that we're initiating
239 static rpc_authn_protocol_id_elt_t auth[1] = { local
250 rpc__register_authn_protocol(auth, 1);
/macosx-10.10.1/tcpdump-61/tcpdump/
H A Dprint-zephyr.c46 int auth; member in struct:z_packet
173 PARSE_FIELD_INT(z.auth);
/macosx-10.10.1/emacs-93/emacs/lisp/gnus/
H A Dimap.el100 ;; => auth
319 '((gssapi imap-gssapi-auth-p imap-gssapi-auth)
320 (kerberos4 imap-kerberos4-auth-p imap-kerberos4-auth)
321 (cram-md5 imap-cram-md5-p imap-cram-md5-auth)
322 (login imap-login-p imap-login-auth)
323 (anonymous imap-anonymous-p imap-anonymous-auth)
324 (digest-md5 imap-digest-md5-p imap-digest-md5-auth))
348 imap-auth
[all...]
/macosx-10.10.1/ppp-786.1.1/Authenticators/Radius/
H A Dmain.c579 char auth[MD4_SIGNATURE_SIZE + 1]; local
715 len = rad_request_authenticator(h, auth, sizeof(auth));
719 radius_decryptmppekey((char*)mppe_send_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len);
727 len = rad_request_authenticator(h, auth, sizeof(auth));
731 radius_decryptmppekey((char*)mppe_recv_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len);
/macosx-10.10.1/ntp-92/ntpq/
H A Dntpq-subs.c395 int auth,
407 return doquery(op, associd, auth, datalen, data, rstatus,
935 const char *auth; local
950 "\nind assid status conf reach auth condition last_event cnt\n");
966 auth = "yes";
968 auth = "none";
976 auth = "ok ";
978 auth = "bad";
980 auth = "none";
1097 conf, reach, auth, conditio
391 doquerylist( struct varlist *vlist, int op, int associd, int auth, u_short *rstatus, int *dsize, char **datap ) argument
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/authd/
H A Dagent.c110 agent_create(engine_t engine, mechanism_t mech, auth_token_t auth, process_t proc, bool firstMech) argument
127 const audit_info_s *audit_info = auth_token_get_audit_info(auth);
160 mach_port_t newBootstrapPort = auth_token_get_creator_bootstrap(auth);
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/javax/security/auth/callback/
H A DMakefile166 javasasldir = $(prefix)/lib/java/classes/sasl/javax/security/auth/callback
188 cd $(top_srcdir) && $(AUTOMAKE) --gnu --include-deps java/javax/security/auth/callback/Makefile
226 subdir = java/javax/security/auth/callback
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/
H A Dauth.c24 * auth.c - PPP authentication and phase control.
98 #define RCSID "$Id: auth.c,v 1.21.20.1 2006/04/17 18:37:14 callie Exp $"
250 * This is used to ensure that we don't start an auth-up/down
269 bool refuse_pap = 0; /* Don't wanna auth. ourselves with PAP */
270 bool refuse_chap = 0; /* Don't wanna auth. ourselves with CHAP */
271 bool refuse_eap = 0; /* Don't wanna auth. ourselves with EAP */
273 bool refuse_mschap = 0; /* Don't wanna auth. ourselves with MS-CHAP */
274 bool refuse_mschap_v2 = 0; /* Don't wanna auth. ourselves with MS-CHAPv2 */
276 bool refuse_mschap = 1; /* Don't wanna auth. ourselves with MS-CHAP */
277 bool refuse_mschap_v2 = 1; /* Don't wanna auth
721 int auth; local
[all...]
/macosx-10.10.1/Heimdal-398.1.2/kdc/
H A Dkrb5tgs.c1017 krb5_authenticator auth; local
1024 krb5_auth_con_getauthenticator(context, ac, &auth);
1025 if(auth->cksum == NULL){
1036 !krb5_checksum_is_keyed(context, auth->cksum->cksumtype)
1039 !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) {
1041 auth->cksum->cksumtype);
1074 auth->cksum);
1086 free_Authenticator(auth);
1087 free(auth);
1252 krb5_authenticator auth; local
[all...]
/macosx-10.10.1/curl-83.1.2/curl/lib/
H A Durl.c526 set->ssh_auth_types = CURLSSH_AUTH_DEFAULT; /* defaults to any auth
1247 unsigned long auth = va_arg(param, unsigned long); local
1249 if(auth == CURLAUTH_NONE) {
1250 data->set.httpauth = auth;
1256 data->state.authhost.iestyle = (auth & CURLAUTH_DIGEST_IE)?TRUE:FALSE;
1258 if(auth & CURLAUTH_DIGEST_IE) {
1259 auth |= CURLAUTH_DIGEST; /* set standard digest bit */
1260 auth &= ~CURLAUTH_DIGEST_IE; /* unset ie digest bit */
1265 auth &= ~CURLAUTH_NTLM; /* no NTLM support */
1266 auth
1336 unsigned long auth = va_arg(param, unsigned long); local
[all...]
H A Dcurl_ntlm.c132 struct auth *authp;
H A Dsmtp.c553 char *auth = NULL; local
573 auth = aprintf("%s", data->set.str[STRING_MAIL_AUTH]);
576 auth = strdup("<>");
578 if(!auth) {
591 Curl_safefree(auth);
598 if(!auth && !size)
601 else if(auth && !size)
603 "MAIL FROM:%s AUTH=%s", from, auth);
604 else if(auth && size)
606 "MAIL FROM:%s AUTH=%s SIZE=%s", from, auth, siz
[all...]
/macosx-10.10.1/Heimdal-398.1.2/appl/ftp/ftp/
H A Dsecurity.c432 auth(char *auth_name) function
450 if(mech->auth) {
451 (*mech->auth)(app_data);
842 ret = (*(*m)->auth)(app_data, host);
/macosx-10.10.1/Libinfo-459/rpc.subproj/
H A Dclnt_perror.c70 #include <rpc/auth.h>
/macosx-10.10.1/OpenSSH-189/openssh/
H A Dauth.h1 /* $OpenBSD: auth.h,v 1.72 2012/12/02 20:34:09 djm Exp $ */
134 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *);
146 #include "auth-pam.h"
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/
H A DEAPOLClientConfiguration.h310 AuthorizationRef auth);
/macosx-10.10.1/ntp-92/include/
H A Dntp_config.h187 struct auth_node auth; member in struct:config_tree
/macosx-10.10.1/remote_cmds-47/telnet.tproj/
H A Dmain.c53 #include <libtelnet/auth.h>
/macosx-10.10.1/tcl-105/tcl_ext/tclsoap/tclsoap/cgi-bin/soap/
H A Dwebservice.tcl34 auth::map_lock
36 auth::map_parse
45 set actiontbl($action) [auth::safeaction $action]
50 auth::authorise $email $passwd new
60 set actiontbl($action) [auth::safeaction $action]
63 auth::map_update
65 auth::map_unlock
73 auth::map_lock
74 auth::map_parse
75 auth
[all...]
/macosx-10.10.1/OpenSSL098-52/src/ssl/
H A Dkssl.c59 /* ssl/kssl.c -- Routines to support (& debug) Kerberos5 auth for openssl
1503 printf("\tstart/auth/end times: %d / %d / %d\n",
2001 KRB5_AUTHENTBODY *auth = NULL; local
2109 if ((auth = (KRB5_AUTHENTBODY *) d2i_KRB5_AUTHENT(NULL, &p,
2119 if (k_gmtime(auth->ctime, &tm_time) &&
2132 if (auth && auth->ctime && auth->ctime->length && auth->ctime->data)
2133 printf("%.*s\n", auth
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/
H A Dpolicyengine.cpp638 CFRef<CFMutableDictionaryRef> auth = makeCFMutableDictionary(); local
640 cfadd(auth, "{%O=%s}", kSecAssessmentAssessmentSource, label);
642 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityRow, CFTempNumber(row));
644 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityOverride, kDisabledOverride);
646 CFDictionaryAddValue(auth, kSecAssessmentAssessmentFromCache, cacheInfo);
648 CFDictionaryAddValue(auth, kSecAssessmentAssessmentWeakSignature, kCFBooleanTrue);
649 CFDictionaryReplaceValue(parent, kSecAssessmentAssessmentAuthority, auth);
651 CFDictionaryAddValue(parent, kSecAssessmentAssessmentAuthority, auth);

Completed in 330 milliseconds

1234567891011>>