HomeSort by relevance Sort by last modified time
    Searched defs:mech (Results 1 - 8 of 8) sorted by null

  /external/curl/lib/
curl_sasl.c 262 const char *mech = NULL; local
281 mech = SASL_MECH_STRING_EXTERNAL;
293 mech = SASL_MECH_STRING_GSSAPI;
312 mech = SASL_MECH_STRING_DIGEST_MD5;
317 mech = SASL_MECH_STRING_CRAM_MD5;
325 mech = SASL_MECH_STRING_NTLM;
337 mech = SASL_MECH_STRING_OAUTHBEARER;
350 mech = SASL_MECH_STRING_XOAUTH2;
361 mech = SASL_MECH_STRING_LOGIN;
370 mech = SASL_MECH_STRING_PLAIN
    [all...]
curl_ntlm_core.c 201 const CK_MECHANISM_TYPE mech = CKM_DES_ECB; /* DES cipher in ECB mode */ local
225 symkey = PK11_ImportSymKey(slot, mech, PK11_OriginUnwrap, CKA_ENCRYPT,
231 param = PK11_ParamFromIV(mech, /* no IV in ECB mode */ NULL);
234 ctx = PK11_CreateContextBySymKey(mech, CKA_ENCRYPT, symkey, param);
security.c 211 buf->size = conn->mech->decode(conn->app_data, buf->data, len,
290 bytes = conn->mech->encode(conn->app_data, from, length, prot_level,
330 len -= conn->mech->overhead(conn->app_data, conn->data_prot,
358 /* decoded_len should be size_t or ssize_t but conn->mech->decode returns an
378 decoded_len = conn->mech->decode(conn->app_data, buf, decoded_len,
481 const struct Curl_sec_client_mech *mech = &Curl_krb5_client_mech; local
483 tmp_allocation = realloc(conn->app_data, mech->size);
485 failf(data, "Failed realloc of size %u", mech->size);
486 mech = NULL;
491 if(mech->init)
    [all...]
urldata.h 1000 const struct Curl_sec_client_mech *mech; member in struct:connectdata
    [all...]
  /external/openssh/
gss-serv.c 181 gss_OID mech; local
185 GSS_C_NO_CHANNEL_BINDINGS, &ctx->client, &mech,
283 client->mech = NULL;
289 client->mech = supported_mechs[i];
293 if (client->mech == NULL)
335 if (gssapi_client.mech && gssapi_client.mech->storecreds) {
336 (*gssapi_client.mech->storecreds)(&gssapi_client);
369 if (gssapi_client.mech && gssapi_client.mech->userok
    [all...]
ssh-gss.h 75 struct ssh_gssapi_mech_struct *mech; member in struct:__anon28162
ssh-pkcs11.c 232 CK_MECHANISM mech = { local
290 } else if ((rv = f->C_SignInit(si->session, &mech, obj)) != CKR_OK) {
sshconnect2.c 627 static u_int mech = 0; local
638 while (mech < gss_supported->count && !ok) {
640 if (gss_supported->elements[mech].length < 128 &&
642 &gss_supported->elements[mech], authctxt->host)) {
645 mech++;
661 packet_put_int((gss_supported->elements[mech].length) + 2);
663 packet_put_char(gss_supported->elements[mech].length);
664 packet_put_raw(gss_supported->elements[mech].elements,
665 gss_supported->elements[mech].length);
674 mech++; /* Move along to next candidate *
    [all...]

Completed in 109 milliseconds