/macosx-10.10.1/ksh-23/ksh/src/cmd/INIT/ |
H A D | hurl.sh | 195 elif lynx ${authorize:+-auth "$authorize"} -source $url 2>/dev/null
|
/macosx-10.10.1/sudo-73/src/ |
H A D | getspwuid.c | 65 # include <auth.h> 71 * Exported for auth/secureware.c
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-acl.conf | 61 by anonymous auth
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | tokendatabase.h | 140 void validate(AclAuthorization auth, const AccessCredentials *cred) argument 141 { TokenAcl::validate(auth, cred, &database()); }
|
/macosx-10.10.1/dcerpc-61/dcerpc/ncklib/ |
H A D | schnauth.c | 219 /* setting auth info on binding handle means that we're initiating 239 static rpc_authn_protocol_id_elt_t auth[1] = { local 250 rpc__register_authn_protocol(auth, 1);
|
/macosx-10.10.1/tcpdump-61/tcpdump/ |
H A D | print-zephyr.c | 46 int auth; member in struct:z_packet 173 PARSE_FIELD_INT(z.auth);
|
/macosx-10.10.1/emacs-93/emacs/lisp/gnus/ |
H A D | imap.el | 100 ;; => auth 319 '((gssapi imap-gssapi-auth-p imap-gssapi-auth) 320 (kerberos4 imap-kerberos4-auth-p imap-kerberos4-auth) 321 (cram-md5 imap-cram-md5-p imap-cram-md5-auth) 322 (login imap-login-p imap-login-auth) 323 (anonymous imap-anonymous-p imap-anonymous-auth) 324 (digest-md5 imap-digest-md5-p imap-digest-md5-auth)) 348 imap-auth [all...] |
/macosx-10.10.1/ppp-786.1.1/Authenticators/Radius/ |
H A D | main.c | 579 char auth[MD4_SIGNATURE_SIZE + 1]; local 715 len = rad_request_authenticator(h, auth, sizeof(auth)); 719 radius_decryptmppekey((char*)mppe_send_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len); 727 len = rad_request_authenticator(h, auth, sizeof(auth)); 731 radius_decryptmppekey((char*)mppe_recv_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len);
|
/macosx-10.10.1/ntp-92/ntpq/ |
H A D | ntpq-subs.c | 395 int auth, 407 return doquery(op, associd, auth, datalen, data, rstatus, 935 const char *auth; local 950 "\nind assid status conf reach auth condition last_event cnt\n"); 966 auth = "yes"; 968 auth = "none"; 976 auth = "ok "; 978 auth = "bad"; 980 auth = "none"; 1097 conf, reach, auth, conditio 391 doquerylist( struct varlist *vlist, int op, int associd, int auth, u_short *rstatus, int *dsize, char **datap ) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/authd/ |
H A D | agent.c | 110 agent_create(engine_t engine, mechanism_t mech, auth_token_t auth, process_t proc, bool firstMech) argument 127 const audit_info_s *audit_info = auth_token_get_audit_info(auth); 160 mach_port_t newBootstrapPort = auth_token_get_creator_bootstrap(auth);
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/javax/security/auth/callback/ |
H A D | Makefile | 166 javasasldir = $(prefix)/lib/java/classes/sasl/javax/security/auth/callback 188 cd $(top_srcdir) && $(AUTOMAKE) --gnu --include-deps java/javax/security/auth/callback/Makefile 226 subdir = java/javax/security/auth/callback
|
/macosx-10.10.1/ppp-786.1.1/Helpers/pppd/ |
H A D | auth.c | 24 * auth.c - PPP authentication and phase control. 98 #define RCSID "$Id: auth.c,v 1.21.20.1 2006/04/17 18:37:14 callie Exp $" 250 * This is used to ensure that we don't start an auth-up/down 269 bool refuse_pap = 0; /* Don't wanna auth. ourselves with PAP */ 270 bool refuse_chap = 0; /* Don't wanna auth. ourselves with CHAP */ 271 bool refuse_eap = 0; /* Don't wanna auth. ourselves with EAP */ 273 bool refuse_mschap = 0; /* Don't wanna auth. ourselves with MS-CHAP */ 274 bool refuse_mschap_v2 = 0; /* Don't wanna auth. ourselves with MS-CHAPv2 */ 276 bool refuse_mschap = 1; /* Don't wanna auth. ourselves with MS-CHAP */ 277 bool refuse_mschap_v2 = 1; /* Don't wanna auth 721 int auth; local [all...] |
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | krb5tgs.c | 1017 krb5_authenticator auth; local 1024 krb5_auth_con_getauthenticator(context, ac, &auth); 1025 if(auth->cksum == NULL){ 1036 !krb5_checksum_is_keyed(context, auth->cksum->cksumtype) 1039 !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) { 1041 auth->cksum->cksumtype); 1074 auth->cksum); 1086 free_Authenticator(auth); 1087 free(auth); 1252 krb5_authenticator auth; local [all...] |
/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | url.c | 526 set->ssh_auth_types = CURLSSH_AUTH_DEFAULT; /* defaults to any auth 1247 unsigned long auth = va_arg(param, unsigned long); local 1249 if(auth == CURLAUTH_NONE) { 1250 data->set.httpauth = auth; 1256 data->state.authhost.iestyle = (auth & CURLAUTH_DIGEST_IE)?TRUE:FALSE; 1258 if(auth & CURLAUTH_DIGEST_IE) { 1259 auth |= CURLAUTH_DIGEST; /* set standard digest bit */ 1260 auth &= ~CURLAUTH_DIGEST_IE; /* unset ie digest bit */ 1265 auth &= ~CURLAUTH_NTLM; /* no NTLM support */ 1266 auth 1336 unsigned long auth = va_arg(param, unsigned long); local [all...] |
H A D | curl_ntlm.c | 132 struct auth *authp;
|
H A D | smtp.c | 553 char *auth = NULL; local 573 auth = aprintf("%s", data->set.str[STRING_MAIL_AUTH]); 576 auth = strdup("<>"); 578 if(!auth) { 591 Curl_safefree(auth); 598 if(!auth && !size) 601 else if(auth && !size) 603 "MAIL FROM:%s AUTH=%s", from, auth); 604 else if(auth && size) 606 "MAIL FROM:%s AUTH=%s SIZE=%s", from, auth, siz [all...] |
/macosx-10.10.1/Heimdal-398.1.2/appl/ftp/ftp/ |
H A D | security.c | 432 auth(char *auth_name) function 450 if(mech->auth) { 451 (*mech->auth)(app_data); 842 ret = (*(*m)->auth)(app_data, host);
|
/macosx-10.10.1/Libinfo-459/rpc.subproj/ |
H A D | clnt_perror.c | 70 #include <rpc/auth.h>
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | auth.h | 1 /* $OpenBSD: auth.h,v 1.72 2012/12/02 20:34:09 djm Exp $ */ 134 int auth_krb5(Authctxt *authctxt, krb5_data *auth, char **client, krb5_data *); 146 #include "auth-pam.h"
|
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPOLClientConfiguration.h | 310 AuthorizationRef auth);
|
/macosx-10.10.1/ntp-92/include/ |
H A D | ntp_config.h | 187 struct auth_node auth; member in struct:config_tree
|
/macosx-10.10.1/remote_cmds-47/telnet.tproj/ |
H A D | main.c | 53 #include <libtelnet/auth.h>
|
/macosx-10.10.1/tcl-105/tcl_ext/tclsoap/tclsoap/cgi-bin/soap/ |
H A D | webservice.tcl | 34 auth::map_lock 36 auth::map_parse 45 set actiontbl($action) [auth::safeaction $action] 50 auth::authorise $email $passwd new 60 set actiontbl($action) [auth::safeaction $action] 63 auth::map_update 65 auth::map_unlock 73 auth::map_lock 74 auth::map_parse 75 auth [all...] |
/macosx-10.10.1/OpenSSL098-52/src/ssl/ |
H A D | kssl.c | 59 /* ssl/kssl.c -- Routines to support (& debug) Kerberos5 auth for openssl 1503 printf("\tstart/auth/end times: %d / %d / %d\n", 2001 KRB5_AUTHENTBODY *auth = NULL; local 2109 if ((auth = (KRB5_AUTHENTBODY *) d2i_KRB5_AUTHENT(NULL, &p, 2119 if (k_gmtime(auth->ctime, &tm_time) && 2132 if (auth && auth->ctime && auth->ctime->length && auth->ctime->data) 2133 printf("%.*s\n", auth [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | policyengine.cpp | 638 CFRef<CFMutableDictionaryRef> auth = makeCFMutableDictionary(); local 640 cfadd(auth, "{%O=%s}", kSecAssessmentAssessmentSource, label); 642 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityRow, CFTempNumber(row)); 644 CFDictionaryAddValue(auth, kSecAssessmentAssessmentAuthorityOverride, kDisabledOverride); 646 CFDictionaryAddValue(auth, kSecAssessmentAssessmentFromCache, cacheInfo); 648 CFDictionaryAddValue(auth, kSecAssessmentAssessmentWeakSignature, kCFBooleanTrue); 649 CFDictionaryReplaceValue(parent, kSecAssessmentAssessmentAuthority, auth); 651 CFDictionaryAddValue(parent, kSecAssessmentAssessmentAuthority, auth);
|