HomeSort by relevance Sort by last modified time
    Searched refs:mech (Results 1 - 25 of 26) sorted by null

1 2

  /external/curl/lib/
security.c 215 buf->size = conn->mech->decode(conn->app_data, buf->data, len,
294 bytes = conn->mech->encode(conn->app_data, from, length, prot_level,
334 len -= conn->mech->overhead(conn->app_data, conn->data_prot,
362 /* decoded_len should be size_t or ssize_t but conn->mech->decode returns an
382 decoded_len = conn->mech->decode(conn->app_data, buf, decoded_len,
485 const struct Curl_sec_client_mech *mech = &Curl_krb5_client_mech; local
487 tmp_allocation = realloc(conn->app_data, mech->size);
489 failf(data, "Failed realloc of size %u", mech->size);
490 mech = NULL;
495 if(mech->init)
    [all...]
curl_sasl.h 92 const char *mech, const char *ir);
113 #define sasl_mech_equal(line, wordlen, mech) \
114 (wordlen == (sizeof(mech) - 1) / sizeof(char) && \
115 !memcmp(line, mech, wordlen))
curl_sasl.c 260 const char *mech = NULL; local
282 mech = SASL_MECH_STRING_EXTERNAL;
295 mech = SASL_MECH_STRING_GSSAPI;
315 mech = SASL_MECH_STRING_DIGEST_MD5;
320 mech = SASL_MECH_STRING_CRAM_MD5;
328 mech = SASL_MECH_STRING_NTLM;
340 mech = SASL_MECH_STRING_OAUTHBEARER;
353 mech = SASL_MECH_STRING_XOAUTH2;
364 mech = SASL_MECH_STRING_LOGIN;
373 mech = SASL_MECH_STRING_PLAIN
    [all...]
curl_ntlm_core.c 226 const CK_MECHANISM_TYPE mech = CKM_DES_ECB; /* DES cipher in ECB mode */ local
250 symkey = PK11_ImportSymKey(slot, mech, PK11_OriginUnwrap, CKA_ENCRYPT,
256 param = PK11_ParamFromIV(mech, /* no IV in ECB mode */ NULL);
259 ctx = PK11_CreateContextBySymKey(mech, CKA_ENCRYPT, symkey, param);
pop3.c 104 static CURLcode pop3_perform_auth(struct connectdata *conn, const char *mech,
507 const char *mech,
513 if(initresp) { /* AUTH <mech> ...<crlf> */
515 result = Curl_pp_sendf(&pop3c->pp, "AUTH %s %s", mech, initresp);
519 result = Curl_pp_sendf(&pop3c->pp, "AUTH %s", mech);
    [all...]
imap.c 106 const char *mech,
570 const char *mech,
577 result = imap_sendf(conn, "AUTHENTICATE %s %s", mech, initresp);
581 result = imap_sendf(conn, "AUTHENTICATE %s", mech);
    [all...]
smtp.c 103 static CURLcode smtp_perform_auth(struct connectdata *conn, const char *mech,
444 const char *mech,
450 if(initresp) { /* AUTH <mech> ...<crlf> */
452 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s %s", mech, initresp);
456 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s", mech);
    [all...]
  /external/openssh/
gss-serv.c 181 gss_OID mech; local
185 GSS_C_NO_CHANNEL_BINDINGS, &ctx->client, &mech,
283 client->mech = NULL;
289 client->mech = supported_mechs[i];
293 if (client->mech == NULL)
335 if (gssapi_client.mech && gssapi_client.mech->storecreds) {
336 (*gssapi_client.mech->storecreds)(&gssapi_client);
369 if (gssapi_client.mech && gssapi_client.mech->userok
    [all...]
ssh-gss.h 75 struct ssh_gssapi_mech_struct *mech; member in struct:__anon29013
sshconnect2.c 652 static u_int mech = 0; local
663 while (mech < gss_supported->count && !ok) {
665 if (gss_supported->elements[mech].length < 128 &&
667 &gss_supported->elements[mech], authctxt->host)) {
670 mech++;
686 packet_put_int((gss_supported->elements[mech].length) + 2);
688 packet_put_char(gss_supported->elements[mech].length);
689 packet_put_raw(gss_supported->elements[mech].elements,
690 gss_supported->elements[mech].length);
699 mech++; /* Move along to next candidate *
    [all...]
ssh-pkcs11.c 232 CK_MECHANISM mech = { local
290 } else if ((rv = f->C_SignInit(si->session, &mech, obj)) != CKR_OK) {
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
test_smtplib.py 357 mech, auth = arg.split()
358 mech = mech.lower()
359 if mech not in sim_auth_credentials:
362 if mech == 'plain' and auth==sim_auth_credentials['plain']:
364 elif mech=='login' and auth==sim_auth_credentials['login']:
  /external/python/cpython2/Lib/test/
test_smtplib.py 383 mech, auth = arg.split()
384 mech = mech.lower()
385 if mech not in sim_auth_credentials:
388 if mech == 'plain' and auth==sim_auth_credentials['plain']:
390 elif mech=='login' and auth==sim_auth_credentials['login']:
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_smtplib.py 356 mech, auth = arg.split()
357 mech = mech.lower()
358 if mech not in sim_auth_credentials:
361 if mech == 'plain' and auth==sim_auth_credentials['plain']:
363 elif mech=='login' and auth==sim_auth_credentials['login']:
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_smtplib.py 356 mech, auth = arg.split()
357 mech = mech.lower()
358 if mech not in sim_auth_credentials:
361 if mech == 'plain' and auth==sim_auth_credentials['plain']:
363 elif mech=='login' and auth==sim_auth_credentials['login']:
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_smtplib.py 356 mech, auth = arg.split()
357 mech = mech.lower()
358 if mech not in sim_auth_credentials:
361 if mech == 'plain' and auth==sim_auth_credentials['plain']:
363 elif mech=='login' and auth==sim_auth_credentials['login']:
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_smtplib.py 356 mech, auth = arg.split()
357 mech = mech.lower()
358 if mech not in sim_auth_credentials:
361 if mech == 'plain' and auth==sim_auth_credentials['plain']:
363 elif mech=='login' and auth==sim_auth_credentials['login']:
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
imaplib.py 343 mech = mechanism.upper()
345 #cap = 'AUTH=%s' % mech
347 # raise self.error("Server doesn't allow %s authentication." % mech)
349 typ, dat = self._simple_command('AUTHENTICATE', mech)
    [all...]
  /external/python/cpython2/Lib/
imaplib.py 356 mech = mechanism.upper()
358 #cap = 'AUTH=%s' % mech
360 # raise self.error("Server doesn't allow %s authentication." % mech)
362 typ, dat = self._simple_command('AUTHENTICATE', mech)
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/
imaplib.py 343 mech = mechanism.upper()
345 #cap = 'AUTH=%s' % mech
347 # raise self.error("Server doesn't allow %s authentication." % mech)
349 typ, dat = self._simple_command('AUTHENTICATE', mech)
    [all...]
  /prebuilts/gdb/linux-x86/lib/python2.7/
imaplib.py 343 mech = mechanism.upper()
345 #cap = 'AUTH=%s' % mech
347 # raise self.error("Server doesn't allow %s authentication." % mech)
349 typ, dat = self._simple_command('AUTHENTICATE', mech)
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
imaplib.py 343 mech = mechanism.upper()
345 #cap = 'AUTH=%s' % mech
347 # raise self.error("Server doesn't allow %s authentication." % mech)
349 typ, dat = self._simple_command('AUTHENTICATE', mech)
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
imaplib.py 343 mech = mechanism.upper()
345 #cap = 'AUTH=%s' % mech
347 # raise self.error("Server doesn't allow %s authentication." % mech)
349 typ, dat = self._simple_command('AUTHENTICATE', mech)
    [all...]
  /prebuilts/go/darwin-x86/src/net/smtp/
smtp.go 197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth})
204 code, msg64, err := c.cmd(0, strings.TrimSpace(fmt.Sprintf("AUTH %s %s", mech, resp64)))
  /prebuilts/go/linux-x86/src/net/smtp/
smtp.go 197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth})
204 code, msg64, err := c.cmd(0, strings.TrimSpace(fmt.Sprintf("AUTH %s %s", mech, resp64)))

Completed in 588 milliseconds

1 2