/external/curl/lib/ |
D | krb5.c | 543 buf->size = conn->mech->decode(conn->app_data, buf->data, len, in read_data() 620 bytes = conn->mech->encode(conn->app_data, from, length, prot_level, in do_sec_send() 660 len -= conn->mech->overhead(conn->app_data, conn->data_prot, in sec_write() 696 if(!conn->mech) in Curl_sec_read_msg() 712 decoded_len = conn->mech->decode(conn->app_data, buf, decoded_len, in Curl_sec_read_msg() 814 const struct Curl_sec_client_mech *mech = &Curl_krb5_client_mech; in choose_mech() local 816 tmp_allocation = realloc(conn->app_data, mech->size); in choose_mech() 818 failf(data, "Failed realloc of size %zu", mech->size); in choose_mech() 819 mech = NULL; in choose_mech() 824 if(mech->init) { in choose_mech() [all …]
|
D | curl_sasl.c | 262 const char *mech = NULL; in Curl_sasl_start() local 290 mech = SASL_MECH_STRING_EXTERNAL; in Curl_sasl_start() 303 mech = SASL_MECH_STRING_GSSAPI; in Curl_sasl_start() 322 mech = SASL_MECH_STRING_DIGEST_MD5; in Curl_sasl_start() 327 mech = SASL_MECH_STRING_CRAM_MD5; in Curl_sasl_start() 335 mech = SASL_MECH_STRING_NTLM; in Curl_sasl_start() 351 mech = SASL_MECH_STRING_OAUTHBEARER; in Curl_sasl_start() 364 mech = SASL_MECH_STRING_XOAUTH2; in Curl_sasl_start() 374 mech = SASL_MECH_STRING_PLAIN; in Curl_sasl_start() 384 mech = SASL_MECH_STRING_LOGIN; in Curl_sasl_start() [all …]
|
D | curl_sasl.h | 92 const char *mech, const char *ir); 113 #define sasl_mech_equal(line, wordlen, mech) \ argument 114 (wordlen == (sizeof(mech) - 1) / sizeof(char) && \ 115 !memcmp(line, mech, wordlen))
|
D | curl_ntlm_core.c | 209 const CK_MECHANISM_TYPE mech = CKM_DES_ECB; /* DES cipher in ECB mode */ in encrypt_des() local 232 symkey = PK11_ImportSymKey(slot, mech, PK11_OriginUnwrap, CKA_ENCRYPT, in encrypt_des() 238 param = PK11_ParamFromIV(mech, /* no IV in ECB mode */ NULL); in encrypt_des() 241 ctx = PK11_CreateContextBySymKey(mech, CKA_ENCRYPT, symkey, param); in encrypt_des()
|
D | pop3.c | 104 static CURLcode pop3_perform_auth(struct connectdata *conn, const char *mech, 464 const char *mech, in pop3_perform_auth() argument 472 result = Curl_pp_sendf(&pop3c->pp, "AUTH %s %s", mech, initresp); in pop3_perform_auth() 476 result = Curl_pp_sendf(&pop3c->pp, "AUTH %s", mech); in pop3_perform_auth()
|
D | smtp.c | 109 static CURLcode smtp_perform_auth(struct connectdata *conn, const char *mech, 411 const char *mech, in smtp_perform_auth() argument 419 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s %s", mech, initresp); in smtp_perform_auth() 423 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s", mech); in smtp_perform_auth()
|
D | imap.c | 107 const char *mech, 528 const char *mech, in imap_perform_authenticate() argument 535 result = imap_sendf(conn, "AUTHENTICATE %s %s", mech, initresp); in imap_perform_authenticate() 539 result = imap_sendf(conn, "AUTHENTICATE %s", mech); in imap_perform_authenticate()
|
D | urldata.h | 1019 const struct Curl_sec_client_mech *mech; member
|
/external/openssh/ |
D | gss-serv.c | 180 gss_OID mech; in ssh_gssapi_accept_ctx() local 184 GSS_C_NO_CHANNEL_BINDINGS, &ctx->client, &mech, in ssh_gssapi_accept_ctx() 282 client->mech = NULL; in ssh_gssapi_getclient() 288 client->mech = supported_mechs[i]; in ssh_gssapi_getclient() 292 if (client->mech == NULL) in ssh_gssapi_getclient() 334 if (gssapi_client.mech && gssapi_client.mech->storecreds) { in ssh_gssapi_storecreds() 335 (*gssapi_client.mech->storecreds)(&gssapi_client); in ssh_gssapi_storecreds() 368 if (gssapi_client.mech && gssapi_client.mech->userok) in ssh_gssapi_userok() 369 if ((*gssapi_client.mech->userok)(&gssapi_client, user)) in ssh_gssapi_userok()
|
D | ssh-pkcs11.c | 354 CK_MECHANISM mech; in pkcs11_get_key() local 397 memset(&mech, 0, sizeof(mech)); in pkcs11_get_key() 398 mech.mechanism = mech_type; in pkcs11_get_key() 399 mech.pParameter = NULL_PTR; in pkcs11_get_key() 400 mech.ulParameterLen = 0; in pkcs11_get_key() 402 if ((rv = f->C_SignInit(si->session, &mech, obj)) != CKR_OK) { in pkcs11_get_key() 1316 CK_MECHANISM mech = { in pkcs11_rsa_generate_private_key() local 1356 if ((rv = f->C_GenerateKeyPair(session, &mech, tpub, npub, tpriv, npriv, in pkcs11_rsa_generate_private_key() 1425 CK_MECHANISM mech = { in pkcs11_ecdsa_generate_private_key() local 1473 if ((rv = f->C_GenerateKeyPair(session, &mech, tpub, npub, tpriv, npriv, in pkcs11_ecdsa_generate_private_key()
|
D | ssh-gss.h | 75 struct ssh_gssapi_mech_struct *mech; member
|
D | sshconnect2.c | 718 gss_OID mech = NULL; in userauth_gssapi() local 729 mech = &authctxt->gss_supported_mechs-> in userauth_gssapi() 732 if (mech->length < 128 && ssh_gssapi_check_mechanism(&gssctxt, in userauth_gssapi() 733 mech, authctxt->host)) { in userauth_gssapi() 740 if (!ok || mech == NULL) in userauth_gssapi() 750 (r = sshpkt_put_u32(ssh, (mech->length) + 2)) != 0 || in userauth_gssapi() 752 (r = sshpkt_put_u8(ssh, mech->length)) != 0 || in userauth_gssapi() 753 (r = sshpkt_put(ssh, mech->elements, mech->length)) != 0 || in userauth_gssapi()
|
/external/python/cpython2/Lib/test/ |
D | test_smtplib.py | 385 mech, auth = arg.split() 386 mech = mech.lower() 387 if mech not in sim_auth_credentials: 390 if mech == 'plain' and auth==sim_auth_credentials['plain']: 392 elif mech=='login' and auth==sim_auth_credentials['login']:
|
/external/python/cpython2/Lib/ |
D | imaplib.py | 359 mech = mechanism.upper() 365 typ, dat = self._simple_command('AUTHENTICATE', mech) 1294 self.mech = mechinst # Callable object to provide/process data 1297 ret = self.mech(self.decode(data))
|
/external/python/cpython3/Lib/ |
D | imaplib.py | 436 mech = mechanism.upper() 442 typ, dat = self._simple_command('AUTHENTICATE', mech) 1406 self.mech = mechinst # Callable object to provide/process data 1409 ret = self.mech(self.decode(data))
|
/external/libxml2/os400/libxmlrpg/ |
D | schematron.rpgle | 33 d XML_SCHEMATRON_OUT_IO... Output to I/O mech
|
/external/hyphenation-patterns/en-US/ |
D | hyph-en-us.hyp.txt | 1046 ser-vo-mech-a-nism 1047 ser-vo-mech-a-nisms
|
D | ushyphex.tex | 1045 ser-vo-mech-a-nism 1046 ser-vo-mech-a-nisms
|
/external/icu/icu4c/source/test/testdata/ |
D | ConverterSelectorTestUTF8.txt | 195 … formou implementace ISO/IEC 10646. Je podporován v mnoha operačních systémech, všech moderních pr…
|
/external/e2fsprogs/po/ |
D | cs.po | 4916 msgstr "e2undo by měl být pouštěn jen na nepřipojených souborových systémech" 6419 "Na souborových systémech se zapnutou vlastností meta_bg není nastavení\n" 6528 msgstr "Na souborových systémech se zapnutou vlastností encoding nelze zapnout vlastnost encrypt.\n" 6536 "na souborových systémech se zapnutou vlastností metadata_csum.\n" 6911 "Na souborových systémech se zapnutou vlastností meta_bg není nastavení\n" 6980 "Na souborových systémech se zapnutou vlastností flex_bg není změna velikosti\n" 8761 #~ msgstr "Varování: %dbajtové iuzly nejsou na starších systémech použitelné\n"
|
/external/curl/docs/ |
D | TODO | 598 using ;auth=<mech> in the login part of the URL.
|
/external/cldr/tools/java/org/unicode/cldr/util/data/transforms/ |
D | internal_raw_IPA-old.txt | 125249 mech mɛk
|
D | internal_raw_IPA.txt | 105617 mech %45569 mɛk
|