Home
last modified time | relevance | path

Searched +full:- +full:- +full:with +full:- +full:gssapi (Results 1 – 25 of 102) sorted by relevance

12345

/external/libcups/config-scripts/
Dcups-gssapi.m42 dnl GSSAPI/Kerberos library detection for CUPS.
4 dnl Copyright 2007-2017 by Apple Inc.
5 dnl Copyright 2006-2007 by Easy Software Products.
13 AC_ARG_ENABLE(gssapi, [ --disable-gssapi disable GSSAPI support]) optenable
19 AC_PATH_TOOL(KRB5CONFIG, krb5-config)
23 # macOS weak-links to the Kerberos framework...
24 LIBGSSAPI="-weak_framework Kerberos"
26 if test -d /System/Library/Frameworks/GSS.framework; then
28 LIBGSSAPI="$LIBGSSAPI -weak_framework GSS"
34 # Solaris has a non-standard krb5-config, don't use it!
[all …]
/external/curl/docs/cmdline-opts/
Dsocks5-gssapi-nec.md1 ---
3 SPDX-License-Identifier: curl
4 Long: socks5-gssapi-nec
5 Help: Compatibility with NEC SOCKS5 server
9 See-also:
10 - socks5
12 - --socks5-gssapi-nec --socks5 hostname:4096 $URL
13 ---
15 # `--socks5-gssapi-nec`
17 As part of the GSS-API negotiation a protection mode is negotiated. RFC 1961
[all …]
Dsocks5-gssapi.md1 ---
3 SPDX-License-Identifier: curl
4 Long: socks5-gssapi
5 Help: Enable GSS-API auth for SOCKS5 proxies
9 See-also:
10 - socks5
12 - --socks5-gssapi --socks5 hostname:4096 $URL
13 ---
15 # `--socks5-gssapi`
17 Use GSS-API authentication when connecting to a SOCKS5 proxy. The GSS-API
[all …]
DMakefile.inc21 # SPDX-License-Identifier: curl
48 abstract-unix-socket.md \
49 alt-svc.md \
52 aws-sigv4.md \
54 ca-native.md \
57 cert-status.md \
58 cert-type.md \
61 compressed-ssh.md \
64 connect-timeout.md \
65 connect-to.md \
[all …]
/external/cronet/stable/net/http/
Dhttp_auth_gssapi_posix.h2 // Use of this source code is governed by a BSD-style license that can be
22 #include <GSS/gssapi.h>
24 #include <gssapi/gssapi.h>
26 #include <gssapi.h>
33 // Mechanism OID for GSSAPI. We always use SPNEGO.
36 // GSSAPILibrary is introduced so unit tests can mock the calls to the GSSAPI
38 // GSSAPI library implementations, then simply passes the arguments on to
49 // These methods match the ones in the GSSAPI library.
114 // If |gssapi_library_name| is empty, hard-coded default library names are
176 // Finds a usable dynamic library for GSSAPI and loads it. The criteria are:
[all …]
Dhttp_auth_gssapi_posix_unittest.cc2 // Use of this source code is governed by a BSD-style license that can be
33 dest->length = 0; in ClearBuffer()
34 delete [] reinterpret_cast<char*>(dest->value); in ClearBuffer()
35 dest->value = nullptr; in ClearBuffer()
44 dest->length = length; in SetBuffer()
46 dest->value = new char[length]; in SetBuffer()
47 memcpy(dest->value, src, length); in SetBuffer()
57 SetBuffer(dest, src->value, src->length); in CopyBuffer()
74 library->ExpectSecurityContext( in EstablishInitialContext()
84 // At present getting tokens from gssapi is fully synchronous, so the callback in UnexpectedCallback()
[all …]
/external/cronet/tot/net/http/
Dhttp_auth_gssapi_posix.h2 // Use of this source code is governed by a BSD-style license that can be
22 #include <GSS/gssapi.h>
24 #include <gssapi/gssapi.h>
26 #include <gssapi.h>
33 // Mechanism OID for GSSAPI. We always use SPNEGO.
36 // GSSAPILibrary is introduced so unit tests can mock the calls to the GSSAPI
38 // GSSAPI library implementations, then simply passes the arguments on to
49 // These methods match the ones in the GSSAPI library.
114 // If |gssapi_library_name| is empty, hard-coded default library names are
176 // Finds a usable dynamic library for GSSAPI and loads it. The criteria are:
[all …]
Dhttp_auth_gssapi_posix_unittest.cc2 // Use of this source code is governed by a BSD-style license that can be
33 dest->length = 0; in ClearBuffer()
34 delete [] reinterpret_cast<char*>(dest->value); in ClearBuffer()
35 dest->value = nullptr; in ClearBuffer()
44 dest->length = length; in SetBuffer()
46 dest->value = new char[length]; in SetBuffer()
47 memcpy(dest->value, src, length); in SetBuffer()
57 SetBuffer(dest, src->value, src->length); in CopyBuffer()
74 library->ExpectSecurityContext( in EstablishInitialContext()
84 // At present getting tokens from gssapi is fully synchronous, so the callback in UnexpectedCallback()
[all …]
/external/curl/CMake/
DFindGSS.cmake21 # SPDX-License-Identifier: curl
28 # - `GSS_ROOT_DIR`: Set this variable to the root installation of GSS. (also supported as envi…
32 # - `GSS_FOUND`: System has the Heimdal library.
33 # - `GSS_FLAVOUR`: "GNU", "MIT" or "Heimdal" if anything found.
34 # - `GSS_INCLUDE_DIRS`: The GSS include directories.
35 # - `GSS_LIBRARIES`: The GSS library names.
36 # - `GSS_LIBRARY_DIRS`: The GSS library directories.
37 # - `GSS_PC_REQUIRES`: The GSS pkg-config packages.
38 # - `GSS_CFLAGS`: Required compiler flags.
39 # - `GSS_VERSION`: This is set to version advertised by pkg-config or read from manifest.
[all …]
/external/curl/lib/vauth/
Dkrb5_gssapi.c22 * SPDX-License-Identifier: curl
24 * RFC4752 The Kerberos V5 ("GSSAPI") SASL Mechanism
47 #pragma GCC diagnostic ignored "-Wdeprecated-declarations"
53 * This is used to evaluate if GSSAPI (Kerberos V5) is supported.
57 * Returns TRUE if Kerberos V5 is supported by the GSS-API library.
67 * This is used to generate an already encoded GSSAPI (Kerberos V5) user token
72 * data [in] - The session handle.
73 * userp [in] - The username.
74 * passwdp [in] - The user's password.
75 * service [in] - The service type such as http, smtp, pop or imap.
[all …]
Dkrb5_sspi.c21 * SPDX-License-Identifier: curl
23 * RFC4752 The Kerberos V5 ("GSSAPI") SASL Mechanism
46 * This is used to evaluate if GSSAPI (Kerberos V5) is supported.
58 status = Curl_pSecFn->QuerySecurityPackageInfo((TCHAR *) in Curl_auth_is_gssapi_supported()
64 Curl_pSecFn->FreeContextBuffer(SecurityPackage); in Curl_auth_is_gssapi_supported()
73 * This is used to generate an already encoded GSSAPI (Kerberos V5) user token
78 * data [in] - The session handle.
79 * userp [in] - The username in the format User or Domain\User.
80 * passwdp [in] - The user's password.
81 * service [in] - The service type such as http, smtp, pop or imap.
[all …]
/external/cronet/tot/net/tools/gssapi/
Dgss_types.h2 // Use of this source code is governed by a BSD-style license that can be
12 // GSSAPI library. The bindings follow RFC 2744. The code follows the RFC
13 // faithfully with the possible exception of `const` qualifiers for some
16 // Note that //net/http/http_auth_gssapi_posix* functions depend on the gssapi.h
18 // system gssapi.h in order to reduce sensitivity to the host environment.
20 // These declarations follow RFC 2744 Appendix A with the exception of using
49 // Following structures are defined as <implementation-specific>.
/external/cronet/stable/net/tools/gssapi/
Dgss_types.h2 // Use of this source code is governed by a BSD-style license that can be
12 // GSSAPI library. The bindings follow RFC 2744. The code follows the RFC
13 // faithfully with the possible exception of `const` qualifiers for some
16 // Note that //net/http/http_auth_gssapi_posix* functions depend on the gssapi.h
18 // system gssapi.h in order to reduce sensitivity to the host environment.
20 // These declarations follow RFC 2744 Appendix A with the exception of using
49 // Following structures are defined as <implementation-specific>.
/external/scapy/scapy/layers/
Dspnego.py1 # SPDX-License-Identifier: GPL-2.0-only
11 - GSSAPI SPNEGO: RFC4178 > RFC2478
12 - GSSAPI SPNEGO NEGOEX: [MS-NEGOEX]
16 `GSSAPI <https://scapy.readthedocs.io/en/latest/layers/gssapi.html#spnego>`_
60 from scapy.layers.gssapi import (
91 # https://datatracker.ietf.org/doc/html/rfc4178#section-4.2.1
111 "1.2.840.48018.1.2.2": Kerberos, # MS KRB5 - Microsoft Kerberos 5
151 # [MS-SPNG] 2.2.1
175 # [MS-SPNG] flavor !
182 # Compat with RFC 4178's SPNEGO_negTokenInit
[all …]
Dgssapi.py1 # SPDX-License-Identifier: GPL-2.0-only
11 - GSSAPI: RFC4121 / RFC2743
12 - GSSAPI C bindings: RFC2744
16 - :class:`~scapy.layers.ntlm.NTLMSSP`
17 - :class:`~scapy.layers.kerberos.KerberosSSP`
18 - :class:`~scapy.layers.spnego.SPNEGOSSP`
19 - :class:`~scapy.layers.msrpce.msnrpc.NetlogonSSP`
23 `GSSAPI <https://scapy.readthedocs.io/en/latest/layers/gssapi.html>`_
60 # https://datatracker.ietf.org/doc/html/rfc1508#page-48
64 name = "GSSAPI"
[all …]
Dldap.py1 # SPDX-License-Identifier: GPL-2.0-only
9 RFC 1777 - LDAP v2
10 RFC 4511 - LDAP v3
86 from scapy.layers.gssapi import (
106 # https://datatracker.ietf.org/doc/html/rfc1777#section-4
211 # https://datatracker.ietf.org/doc/html/rfc4511#section-4.2
216 # CONTEXT-SPECIFIC = 0x80
220 sasl = 0xA3 # CONTEXT-SPECIFIC | CONSTRUCTED
221 # [MS-ADTS] sect 5.1.1.1
305 _SASL_MECHANISMS = {b"GSS-SPNEGO": GSSAPI_BLOB, b"GSSAPI": GSSAPI_BLOB}
[all …]
/external/cronet/stable/net/android/
Ddummy_spnego_authenticator.h2 // Use of this source code is governed by a BSD-style license that can be
18 // This includes a basic stub of the Mock GSSAPI library, so that OS independent
22 // These constant values are arbitrary, and different from the real GSSAPI
31 // #global-scope
39 // Copy of class in Mock GSSAPI library.
88 // Note that many of these fields only exist for compatibility with the
89 // non-Android version of the tests. Only the response_code and tokens are
/external/cronet/tot/net/android/
Ddummy_spnego_authenticator.h2 // Use of this source code is governed by a BSD-style license that can be
18 // This includes a basic stub of the Mock GSSAPI library, so that OS independent
22 // These constant values are arbitrary, and different from the real GSSAPI
31 // #global-scope
39 // Copy of class in Mock GSSAPI library.
88 // Note that many of these fields only exist for compatibility with the
89 // non-Android version of the tests. Only the response_code and tokens are
/external/curl/.github/workflows/
Dlinux-old.yml3 # SPDX-License-Identifier: curl
12 # stretch has ELTS support from Freexian until 2027-06-30
13 # For ELTS info see https://www.freexian.com/lts/extended/docs/how-to-use-extended-lts/
14 # The Debian key will expire 2025-05-20, after which package signature
17 # and won't conflict with the curl we're building.
24 - master
25 - '*/ci'
26 paths-ignore:
27 - '**/*.md'
28 - '.circleci/**'
[all …]
/external/libcups/cups/
Dhttp-private.h4 * Copyright 2007-2018 by Apple Inc.
5 * Copyright 1997-2007 by Easy Software Products, all rights reserved.
42 # include <GSS/gssapi.h>
44 # include <gssapi/gssapi.h>
46 # include <gssapi.h>
67 # include "ipp-private.h"
120 # define _HTTP_RESOLVE_DEFAULT 0 /* Just resolve with default options */
171 BYTE *decryptBuffer; /* Data pre-decryption*/
174 BYTE *readBuffer; /* Data post-decryption */
177 BYTE *writeBuffer; /* Data pre-encryption */
[all …]
/external/libcups/doc/help/
Dkerberos.html2 <!-- SECTION: Getting Started -->
5 <LINK REL="STYLESHEET" TYPE="text/css" HREF="../cups-printable.css">
16 <p>The following are required to use Kerberos with CUPS:</p>
23 …<li>DNS server(s) with static IP addresses for all CUPS servers or configured to allow DHCP update…
30 …<li>LDAP-based user accounts - both OpenDirectory and ActiveDirectory provide this with the KDC, a…
40with CUPS, you will need to configure Kerberos on your system and setup a system as a KDC. Because…
46 <LI><A HREF="http://web.mit.edu/macdev/KfM/Common/Documentation/faq-osx.html">Kerberos
55 <LI><A HREF="http://tldp.org/HOWTO/html_single/Kerberos-Infrastructure-HOWTO/">Kerberos
75 … enabled Kerberos authentication, use the built-in "authenticated" policy or your own custom polic…
80GSSAPI and the service/principal names "host/server.example.com" for command-line access and "HTTP…
[all …]
/external/curl/docs/
DKNOWN_BUGS17 2.1 IMAPS connection fails with Rustls error
18 2.3 Unable to use PKCS12 certificate with Secure Transport
20 2.5 Client cert handling with Issuer DN differs between backends
21 2.7 Client cert (MTLS) issues with Schannel
23 2.13 CURLOPT_CERTINFO results in CURLE_OUT_OF_MEMORY with Schannel
34 4.1 -T /dev/stdin may upload with an incorrect content length
35 4.2 -T - always uploads chunked
39 5.2 curl-config --libs contains private details
41 5.6 Cygwin: make install installs curl-config.1 twice
42 5.11 configure --with-gssapi with Heimdal is ignored on macOS
[all …]
Doptions-in-versions7 This document lists all command line options present in curl, together with
13 --abstract-unix-socket 7.53.0
14 --alt-svc 7.64.1
15 --anyauth 7.10.6
16 --append (-a) 4.8
17 --aws-sigv4 7.75.0
18 --basic 7.10.6
19 --ca-native 8.2.0
20 --cacert 7.5
21 --capath 7.9.8
[all …]
/external/curl/lib/
Dcurl_config.h.cmake21 * SPDX-License-Identifier: curl
28 /* define "1" to use built-in ca store of TLS backend */
37 /* disables alt-svc */
58 /* disables aws-sigv4 */
64 /* disables DNS-over-HTTPS */
82 /* disables headers-api support */
103 /* disables --libcurl option from the curl tool */
127 /* disables built-in progress meter */
139 /* disables SHA-512/256 hash algorithm */
306 /* Define to 1 if you have a working glibc-style strerror_r function. */
[all …]
/external/curl/
Dconfigure.ac21 # SPDX-License-Identifier: curl
24 dnl Process this file with autoconf to produce a configure script.
29 AC_INIT([curl], [-], [a suitable curl mailing list: https://curl.se/mail/])
69 if test -z "$SED"; then
73 if test -z "$SED" || test "$SED" = "not_found"; then
81 if test -z "$GREP"; then
85 if test -z "$GREP" || test "$GREP" = "not_found"; then
91 dnl 'grep -E' is mandatory for configure process and libtool.
93 if test -z "$EGREP"; then
95 AC_MSG_CHECKING([that grep -E works])
[all …]

12345