Home
last modified time | relevance | path

Searched refs:Auth (Results 1 – 25 of 8308) sorted by relevance

12345678910>>...333

/dports/www/p5-CGI-Ex/CGI-Ex-2.50/samples/benchmark/
H A Dbench_auth.pl32 use CGI::Ex::Auth;
36 package Auth; package
89 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0;
91 die "printed was set" if $Auth::printed;
95 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0;
102 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0;
108 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0;
115 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0;
121 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0;
127 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0;
[all …]
/dports/www/squid/squid-4.15/src/tests/
H A Dstub_libauth.cc17 Auth::Config * Auth::Config::Find(const char *) STUB_RETVAL(NULL)
19 Auth::ConfigVector Auth::TheConfig;
30 std::vector<Auth::Scheme::Pointer> *Auth::Scheme::_Schemes = NULL;
31 void Auth::Scheme::AddScheme(Auth::Scheme::Pointer) STUB
32 Auth::Scheme::Pointer Auth::Scheme::Find(const char *) STUB_RETVAL(NULL)
33 std::vector<Auth::Scheme::Pointer> & Auth::Scheme::GetSchemes() STUB_RETVAL(*_Schemes);
37 Auth::User::User(Auth::Config *, const char *) STUB
38 Auth::CredentialState Auth::User::credentials() const STUB_RETVAL(credentials_state)
40 void Auth::User::absorb(Auth::User::Pointer) STUB
62 Auth::Direction Auth::UserRequest::direction() STUB_RETVAL(Auth::CRED_ERROR)
[all …]
/dports/multimedia/zoneminder/zoneminder-1.36.5/web/api/lib/Cake/Test/Case/Controller/Component/
H A DAuthComponentTest.php393 $this->Auth->request = $request;
418 $this->Auth->Session->destroy();
481 ->with($this->Auth->request)
487 $result = $this->Auth->login();
515 $result = $this->Auth->login();
924 $this->Auth->request->url = $this->Auth->request->here = Router::normalize($url);
935 $this->Auth->request->url = $this->Auth->request->here = Router::normalize($url);
951 $this->Auth->request->url = $this->Auth->request->here = Router::normalize($url);
1443 $this->Auth->logout();
1462 $this->Auth->logout();
[all …]
/dports/www/p5-CGI-Ex/CGI-Ex-2.50/t/
H A D8_auth_00_base.t15 package Auth;
30 $Auth::printed = $Auth::set_cookie = $Auth::deleted_cookie = 0;
56 Auth::reset();
63 Auth::reset();
70 Auth::reset();
77 Auth::reset();
85 Auth::reset();
92 Auth::reset();
99 Auth::reset();
107 Auth::reset();
[all …]
/dports/www/squid/squid-4.15/src/auth/basic/
H A DUserRequest.cc33 Auth::Basic::User const *basic_auth = dynamic_cast<Auth::Basic::User const *>(user().getRaw()); in authenticated()
75 Auth::Direction
80 return Auth::CRED_ERROR; in module_direction()
84 case Auth::Unchecked: in module_direction()
85 case Auth::Pending: in module_direction()
88 case Auth::Ok: in module_direction()
91 return Auth::CRED_VALID; in module_direction()
93 case Auth::Failed: in module_direction()
106 Auth::Basic::User *basic_auth = dynamic_cast<Auth::Basic::User *>(user().getRaw()); in startHelperLookup()
120 Auth::QueueNode *node = new Auth::QueueNode(this, handler, data); in startHelperLookup()
[all …]
/dports/www/squid/squid-4.15/src/auth/digest/
H A DUserRequest.cc94 Auth::Digest::User *digest_user = dynamic_cast<Auth::Digest::User*>(auth_user.getRaw()); in authenticate()
193 Auth::Direction
197 return Auth::CRED_ERROR; in module_direction()
201 case Auth::Ok: in module_direction()
202 return Auth::CRED_VALID; in module_direction()
204 case Auth::Handshake: in module_direction()
205 case Auth::Failed: in module_direction()
209 case Auth::Unchecked: in module_direction()
210 case Auth::Pending: in module_direction()
301 if (static_cast<Auth::Digest::Config*>(Auth::Config::Find("digest"))->utf8) { in startHelperLookup()
[all …]
/dports/x11/sddm/sddm-0.19.0/src/auth/
H A DAuth.cpp53 Private(Auth *parent);
100 Auth::SocketServer* Auth::SocketServer::instance() { in instance()
110 Auth::Private::Private(Auth *parent) in Private()
140 Auth::Private::~Private() in ~Private()
152 Auth *auth = qobject_cast<Auth*>(parent()); in dataPending()
219 Q_EMIT qobject_cast<Auth*>(parent())->finished((Auth::HelperExitStatus)exitCode); in childExited()
245 Auth::Auth(QObject* parent) in Auth() function in SDDM::Auth
250 Auth::~Auth() { in ~Auth()
254 void Auth::registerTypes() { in registerTypes()
264 bool Auth::isGreeter() const in isGreeter()
[all …]
/dports/www/squid/squid-4.15/src/auth/ntlm/
H A DConfig.cc55 Auth::Ntlm::Config::done() in done()
57 Auth::Config::done(); in done()
78 Auth::Ntlm::Config::dump(StoreEntry * entry, const char *name, Auth::Config * scheme) const in dump()
91 Auth::Ntlm::Config::parse(Auth::Config * scheme, int n_configured, char *param_str) in parse()
115 Auth::Ntlm::Config::init(Auth::Config *) in init()
192 case Auth::Failed: in fixHeader()
198 case Auth::Ok: in fixHeader()
204 case Auth::Unchecked: in fixHeader()
236 Auth::UserRequest::Pointer
239 Auth::Ntlm::User *newUser = new Auth::Ntlm::User(Auth::Config::Find("ntlm"), aRequestRealm); in decode()
[all …]
H A DUserRequest.cc90 Auth::Direction
99 return Auth::CRED_ERROR; in module_direction()
103 case Auth::Handshake: in module_direction()
107 case Auth::Ok: in module_direction()
110 case Auth::Failed: in module_direction()
221 case Auth::Unchecked: in authenticate()
233 case Auth::Pending: in authenticate()
237 case Auth::Handshake: in authenticate()
248 case Auth::Ok: in authenticate()
252 case Auth::Failed: in authenticate()
[all …]
/dports/sysutils/helmfile/vault-f6547fa8e820/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-openldap/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-terraform/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-mongodbatlas/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-jwt/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-database-mongodbatlas/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-ad/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-azure/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-gcp/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault/sdk/logical/
H A Dtranslate_response.go29 if input.Auth != nil {
30 httpResp.Auth = &HTTPAuth{
32 Accessor: input.Auth.Accessor,
33 Policies: input.Auth.Policies,
41 Orphan: input.Auth.Orphan,
63 if input.Auth != nil {
64 logicalResp.Auth = &Auth{
72 Orphan: input.Auth.Orphan,
74 logicalResp.Auth.Renewable = input.Auth.Renewable
75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration)
[all …]

12345678910>>...333