/external/curl/lib/ |
security.c | 215 buf->size = conn->mech->decode(conn->app_data, buf->data, len, 294 bytes = conn->mech->encode(conn->app_data, from, length, prot_level, 334 len -= conn->mech->overhead(conn->app_data, conn->data_prot, 362 /* decoded_len should be size_t or ssize_t but conn->mech->decode returns an 382 decoded_len = conn->mech->decode(conn->app_data, buf, decoded_len, 485 const struct Curl_sec_client_mech *mech = &Curl_krb5_client_mech; local 487 tmp_allocation = realloc(conn->app_data, mech->size); 489 failf(data, "Failed realloc of size %u", mech->size); 490 mech = NULL; 495 if(mech->init) [all...] |
curl_sasl.h | 92 const char *mech, const char *ir); 113 #define sasl_mech_equal(line, wordlen, mech) \ 114 (wordlen == (sizeof(mech) - 1) / sizeof(char) && \ 115 !memcmp(line, mech, wordlen))
|
curl_sasl.c | 260 const char *mech = NULL; local 282 mech = SASL_MECH_STRING_EXTERNAL; 295 mech = SASL_MECH_STRING_GSSAPI; 315 mech = SASL_MECH_STRING_DIGEST_MD5; 320 mech = SASL_MECH_STRING_CRAM_MD5; 328 mech = SASL_MECH_STRING_NTLM; 340 mech = SASL_MECH_STRING_OAUTHBEARER; 353 mech = SASL_MECH_STRING_XOAUTH2; 364 mech = SASL_MECH_STRING_LOGIN; 373 mech = SASL_MECH_STRING_PLAIN [all...] |
curl_ntlm_core.c | 226 const CK_MECHANISM_TYPE mech = CKM_DES_ECB; /* DES cipher in ECB mode */ local 250 symkey = PK11_ImportSymKey(slot, mech, PK11_OriginUnwrap, CKA_ENCRYPT, 256 param = PK11_ParamFromIV(mech, /* no IV in ECB mode */ NULL); 259 ctx = PK11_CreateContextBySymKey(mech, CKA_ENCRYPT, symkey, param);
|
pop3.c | 104 static CURLcode pop3_perform_auth(struct connectdata *conn, const char *mech, 507 const char *mech, 513 if(initresp) { /* AUTH <mech> ...<crlf> */ 515 result = Curl_pp_sendf(&pop3c->pp, "AUTH %s %s", mech, initresp); 519 result = Curl_pp_sendf(&pop3c->pp, "AUTH %s", mech); [all...] |
imap.c | 106 const char *mech, 570 const char *mech, 577 result = imap_sendf(conn, "AUTHENTICATE %s %s", mech, initresp); 581 result = imap_sendf(conn, "AUTHENTICATE %s", mech); [all...] |
smtp.c | 103 static CURLcode smtp_perform_auth(struct connectdata *conn, const char *mech, 444 const char *mech, 450 if(initresp) { /* AUTH <mech> ...<crlf> */ 452 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s %s", mech, initresp); 456 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s", mech); [all...] |
/external/openssh/ |
gss-serv.c | 181 gss_OID mech; local 185 GSS_C_NO_CHANNEL_BINDINGS, &ctx->client, &mech, 283 client->mech = NULL; 289 client->mech = supported_mechs[i]; 293 if (client->mech == NULL) 335 if (gssapi_client.mech && gssapi_client.mech->storecreds) { 336 (*gssapi_client.mech->storecreds)(&gssapi_client); 369 if (gssapi_client.mech && gssapi_client.mech->userok [all...] |
ssh-gss.h | 75 struct ssh_gssapi_mech_struct *mech; member in struct:__anon29013
|
sshconnect2.c | 652 static u_int mech = 0; local 663 while (mech < gss_supported->count && !ok) { 665 if (gss_supported->elements[mech].length < 128 && 667 &gss_supported->elements[mech], authctxt->host)) { 670 mech++; 686 packet_put_int((gss_supported->elements[mech].length) + 2); 688 packet_put_char(gss_supported->elements[mech].length); 689 packet_put_raw(gss_supported->elements[mech].elements, 690 gss_supported->elements[mech].length); 699 mech++; /* Move along to next candidate * [all...] |
ssh-pkcs11.c | 232 CK_MECHANISM mech = { local 290 } else if ((rv = f->C_SignInit(si->session, &mech, obj)) != CKR_OK) {
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
test_smtplib.py | 357 mech, auth = arg.split()
358 mech = mech.lower()
359 if mech not in sim_auth_credentials:
362 if mech == 'plain' and auth==sim_auth_credentials['plain']:
364 elif mech=='login' and auth==sim_auth_credentials['login']:
|
/external/python/cpython2/Lib/test/ |
test_smtplib.py | 383 mech, auth = arg.split() 384 mech = mech.lower() 385 if mech not in sim_auth_credentials: 388 if mech == 'plain' and auth==sim_auth_credentials['plain']: 390 elif mech=='login' and auth==sim_auth_credentials['login']:
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_smtplib.py | 356 mech, auth = arg.split() 357 mech = mech.lower() 358 if mech not in sim_auth_credentials: 361 if mech == 'plain' and auth==sim_auth_credentials['plain']: 363 elif mech=='login' and auth==sim_auth_credentials['login']:
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_smtplib.py | 356 mech, auth = arg.split() 357 mech = mech.lower() 358 if mech not in sim_auth_credentials: 361 if mech == 'plain' and auth==sim_auth_credentials['plain']: 363 elif mech=='login' and auth==sim_auth_credentials['login']:
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_smtplib.py | 356 mech, auth = arg.split() 357 mech = mech.lower() 358 if mech not in sim_auth_credentials: 361 if mech == 'plain' and auth==sim_auth_credentials['plain']: 363 elif mech=='login' and auth==sim_auth_credentials['login']:
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_smtplib.py | 356 mech, auth = arg.split() 357 mech = mech.lower() 358 if mech not in sim_auth_credentials: 361 if mech == 'plain' and auth==sim_auth_credentials['plain']: 363 elif mech=='login' and auth==sim_auth_credentials['login']:
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
imaplib.py | 343 mech = mechanism.upper()
345 #cap = 'AUTH=%s' % mech
347 # raise self.error("Server doesn't allow %s authentication." % mech)
349 typ, dat = self._simple_command('AUTHENTICATE', mech)
[all...] |
/external/python/cpython2/Lib/ |
imaplib.py | 356 mech = mechanism.upper() 358 #cap = 'AUTH=%s' % mech 360 # raise self.error("Server doesn't allow %s authentication." % mech) 362 typ, dat = self._simple_command('AUTHENTICATE', mech) [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
imaplib.py | 343 mech = mechanism.upper() 345 #cap = 'AUTH=%s' % mech 347 # raise self.error("Server doesn't allow %s authentication." % mech) 349 typ, dat = self._simple_command('AUTHENTICATE', mech) [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
imaplib.py | 343 mech = mechanism.upper() 345 #cap = 'AUTH=%s' % mech 347 # raise self.error("Server doesn't allow %s authentication." % mech) 349 typ, dat = self._simple_command('AUTHENTICATE', mech) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
imaplib.py | 343 mech = mechanism.upper() 345 #cap = 'AUTH=%s' % mech 347 # raise self.error("Server doesn't allow %s authentication." % mech) 349 typ, dat = self._simple_command('AUTHENTICATE', mech) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
imaplib.py | 343 mech = mechanism.upper() 345 #cap = 'AUTH=%s' % mech 347 # raise self.error("Server doesn't allow %s authentication." % mech) 349 typ, dat = self._simple_command('AUTHENTICATE', mech) [all...] |
/prebuilts/go/darwin-x86/src/net/smtp/ |
smtp.go | 197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth}) 204 code, msg64, err := c.cmd(0, strings.TrimSpace(fmt.Sprintf("AUTH %s %s", mech, resp64)))
|
/prebuilts/go/linux-x86/src/net/smtp/ |
smtp.go | 197 mech, resp, err := a.Start(&ServerInfo{c.serverName, c.tls, c.auth}) 204 code, msg64, err := c.cmd(0, strings.TrimSpace(fmt.Sprintf("AUTH %s %s", mech, resp64)))
|