/dports/www/p5-CGI-Ex/CGI-Ex-2.50/samples/benchmark/ |
H A D | bench_auth.pl | 32 use CGI::Ex::Auth; 36 package Auth; package 89 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0; 91 die "printed was set" if $Auth::printed; 95 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0; 102 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0; 108 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0; 115 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0; 121 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0; 127 $Auth::printed = $Auth::set_cookie = $Auth::delete_cookie = 0; [all …]
|
/dports/www/squid/squid-4.15/src/tests/ |
H A D | stub_libauth.cc | 17 Auth::Config * Auth::Config::Find(const char *) STUB_RETVAL(NULL) 19 Auth::ConfigVector Auth::TheConfig; 30 std::vector<Auth::Scheme::Pointer> *Auth::Scheme::_Schemes = NULL; 31 void Auth::Scheme::AddScheme(Auth::Scheme::Pointer) STUB 32 Auth::Scheme::Pointer Auth::Scheme::Find(const char *) STUB_RETVAL(NULL) 33 std::vector<Auth::Scheme::Pointer> & Auth::Scheme::GetSchemes() STUB_RETVAL(*_Schemes); 37 Auth::User::User(Auth::Config *, const char *) STUB 38 Auth::CredentialState Auth::User::credentials() const STUB_RETVAL(credentials_state) 40 void Auth::User::absorb(Auth::User::Pointer) STUB 62 Auth::Direction Auth::UserRequest::direction() STUB_RETVAL(Auth::CRED_ERROR) [all …]
|
/dports/multimedia/zoneminder/zoneminder-1.36.5/web/api/lib/Cake/Test/Case/Controller/Component/ |
H A D | AuthComponentTest.php | 393 $this->Auth->request = $request; 418 $this->Auth->Session->destroy(); 481 ->with($this->Auth->request) 487 $result = $this->Auth->login(); 515 $result = $this->Auth->login(); 924 $this->Auth->request->url = $this->Auth->request->here = Router::normalize($url); 935 $this->Auth->request->url = $this->Auth->request->here = Router::normalize($url); 951 $this->Auth->request->url = $this->Auth->request->here = Router::normalize($url); 1443 $this->Auth->logout(); 1462 $this->Auth->logout(); [all …]
|
/dports/www/p5-CGI-Ex/CGI-Ex-2.50/t/ |
H A D | 8_auth_00_base.t | 15 package Auth; 30 $Auth::printed = $Auth::set_cookie = $Auth::deleted_cookie = 0; 56 Auth::reset(); 63 Auth::reset(); 70 Auth::reset(); 77 Auth::reset(); 85 Auth::reset(); 92 Auth::reset(); 99 Auth::reset(); 107 Auth::reset(); [all …]
|
/dports/www/squid/squid-4.15/src/auth/basic/ |
H A D | UserRequest.cc | 33 Auth::Basic::User const *basic_auth = dynamic_cast<Auth::Basic::User const *>(user().getRaw()); in authenticated() 75 Auth::Direction 80 return Auth::CRED_ERROR; in module_direction() 84 case Auth::Unchecked: in module_direction() 85 case Auth::Pending: in module_direction() 88 case Auth::Ok: in module_direction() 91 return Auth::CRED_VALID; in module_direction() 93 case Auth::Failed: in module_direction() 106 Auth::Basic::User *basic_auth = dynamic_cast<Auth::Basic::User *>(user().getRaw()); in startHelperLookup() 120 Auth::QueueNode *node = new Auth::QueueNode(this, handler, data); in startHelperLookup() [all …]
|
/dports/www/squid/squid-4.15/src/auth/digest/ |
H A D | UserRequest.cc | 94 Auth::Digest::User *digest_user = dynamic_cast<Auth::Digest::User*>(auth_user.getRaw()); in authenticate() 193 Auth::Direction 197 return Auth::CRED_ERROR; in module_direction() 201 case Auth::Ok: in module_direction() 202 return Auth::CRED_VALID; in module_direction() 204 case Auth::Handshake: in module_direction() 205 case Auth::Failed: in module_direction() 209 case Auth::Unchecked: in module_direction() 210 case Auth::Pending: in module_direction() 301 if (static_cast<Auth::Digest::Config*>(Auth::Config::Find("digest"))->utf8) { in startHelperLookup() [all …]
|
/dports/x11/sddm/sddm-0.19.0/src/auth/ |
H A D | Auth.cpp | 53 Private(Auth *parent); 100 Auth::SocketServer* Auth::SocketServer::instance() { in instance() 110 Auth::Private::Private(Auth *parent) in Private() 140 Auth::Private::~Private() in ~Private() 152 Auth *auth = qobject_cast<Auth*>(parent()); in dataPending() 219 Q_EMIT qobject_cast<Auth*>(parent())->finished((Auth::HelperExitStatus)exitCode); in childExited() 245 Auth::Auth(QObject* parent) in Auth() function in SDDM::Auth 250 Auth::~Auth() { in ~Auth() 254 void Auth::registerTypes() { in registerTypes() 264 bool Auth::isGreeter() const in isGreeter() [all …]
|
/dports/www/squid/squid-4.15/src/auth/ntlm/ |
H A D | Config.cc | 55 Auth::Ntlm::Config::done() in done() 57 Auth::Config::done(); in done() 78 Auth::Ntlm::Config::dump(StoreEntry * entry, const char *name, Auth::Config * scheme) const in dump() 91 Auth::Ntlm::Config::parse(Auth::Config * scheme, int n_configured, char *param_str) in parse() 115 Auth::Ntlm::Config::init(Auth::Config *) in init() 192 case Auth::Failed: in fixHeader() 198 case Auth::Ok: in fixHeader() 204 case Auth::Unchecked: in fixHeader() 236 Auth::UserRequest::Pointer 239 Auth::Ntlm::User *newUser = new Auth::Ntlm::User(Auth::Config::Find("ntlm"), aRequestRealm); in decode() [all …]
|
H A D | UserRequest.cc | 90 Auth::Direction 99 return Auth::CRED_ERROR; in module_direction() 103 case Auth::Handshake: in module_direction() 107 case Auth::Ok: in module_direction() 110 case Auth::Failed: in module_direction() 221 case Auth::Unchecked: in authenticate() 233 case Auth::Pending: in authenticate() 237 case Auth::Handshake: in authenticate() 248 case Auth::Ok: in authenticate() 252 case Auth::Failed: in authenticate() [all …]
|
/dports/sysutils/helmfile/vault-f6547fa8e820/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-openldap/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-terraform/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-mongodbatlas/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-jwt/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-alicloud/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-database-mongodbatlas/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-ad/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-centrify/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-azure/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-kv/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-gcp/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault/sdk/logical/ |
H A D | translate_response.go | 29 if input.Auth != nil { 30 httpResp.Auth = &HTTPAuth{ 32 Accessor: input.Auth.Accessor, 33 Policies: input.Auth.Policies, 41 Orphan: input.Auth.Orphan, 63 if input.Auth != nil { 64 logicalResp.Auth = &Auth{ 72 Orphan: input.Auth.Orphan, 74 logicalResp.Auth.Renewable = input.Auth.Renewable 75 logicalResp.Auth.TTL = time.Second * time.Duration(input.Auth.LeaseDuration) [all …]
|