HomeSort by relevance Sort by last modified time
    Searched defs:mech (Results 1 - 8 of 8) sorted by null

  /external/curl/lib/
curl_sasl.c 260 const char *mech = NULL; local
282 mech = SASL_MECH_STRING_EXTERNAL;
295 mech = SASL_MECH_STRING_GSSAPI;
315 mech = SASL_MECH_STRING_DIGEST_MD5;
320 mech = SASL_MECH_STRING_CRAM_MD5;
328 mech = SASL_MECH_STRING_NTLM;
340 mech = SASL_MECH_STRING_OAUTHBEARER;
353 mech = SASL_MECH_STRING_XOAUTH2;
364 mech = SASL_MECH_STRING_LOGIN;
373 mech = SASL_MECH_STRING_PLAIN
    [all...]
curl_ntlm_core.c 226 const CK_MECHANISM_TYPE mech = CKM_DES_ECB; /* DES cipher in ECB mode */ local
250 symkey = PK11_ImportSymKey(slot, mech, PK11_OriginUnwrap, CKA_ENCRYPT,
256 param = PK11_ParamFromIV(mech, /* no IV in ECB mode */ NULL);
259 ctx = PK11_CreateContextBySymKey(mech, CKA_ENCRYPT, symkey, param);
security.c 215 buf->size = conn->mech->decode(conn->app_data, buf->data, len,
294 bytes = conn->mech->encode(conn->app_data, from, length, prot_level,
334 len -= conn->mech->overhead(conn->app_data, conn->data_prot,
362 /* decoded_len should be size_t or ssize_t but conn->mech->decode returns an
382 decoded_len = conn->mech->decode(conn->app_data, buf, decoded_len,
485 const struct Curl_sec_client_mech *mech = &Curl_krb5_client_mech; local
487 tmp_allocation = realloc(conn->app_data, mech->size);
489 failf(data, "Failed realloc of size %u", mech->size);
490 mech = NULL;
495 if(mech->init)
    [all...]
urldata.h 1037 const struct Curl_sec_client_mech *mech; member in struct:connectdata
    [all...]
  /external/openssh/
gss-serv.c 181 gss_OID mech; local
185 GSS_C_NO_CHANNEL_BINDINGS, &ctx->client, &mech,
283 client->mech = NULL;
289 client->mech = supported_mechs[i];
293 if (client->mech == NULL)
335 if (gssapi_client.mech && gssapi_client.mech->storecreds) {
336 (*gssapi_client.mech->storecreds)(&gssapi_client);
369 if (gssapi_client.mech && gssapi_client.mech->userok
    [all...]
ssh-gss.h 75 struct ssh_gssapi_mech_struct *mech; member in struct:__anon29013
ssh-pkcs11.c 232 CK_MECHANISM mech = { local
290 } else if ((rv = f->C_SignInit(si->session, &mech, obj)) != CKR_OK) {
sshconnect2.c 652 static u_int mech = 0; local
663 while (mech < gss_supported->count && !ok) {
665 if (gss_supported->elements[mech].length < 128 &&
667 &gss_supported->elements[mech], authctxt->host)) {
670 mech++;
686 packet_put_int((gss_supported->elements[mech].length) + 2);
688 packet_put_char(gss_supported->elements[mech].length);
689 packet_put_raw(gss_supported->elements[mech].elements,
690 gss_supported->elements[mech].length);
699 mech++; /* Move along to next candidate *
    [all...]

Completed in 448 milliseconds