/dports/security/ncrack/ncrack-0.7/ |
H A D | ntlmssp.cc | 233 struct auth_data *auth_data = NULL; in ntlmssp_init_context() local 235 auth_data = (struct auth_data*)malloc(sizeof(struct auth_data)); in ntlmssp_init_context() 239 memset(auth_data, 0, sizeof(struct auth_data)); in ntlmssp_init_context() 255 struct auth_data *auth_data = (struct auth_data*)ptr; in encoder() local 257 if (size + auth_data->len > auth_data->allocated) { in encoder() 266 memcpy(auth_data->buf, tmp, auth_data->len); in encoder() 277 ntlm_negotiate_message(struct auth_data *auth_data) in ntlm_negotiate_message() argument 406 encode_ntlm_auth(struct auth_data *auth_data, in encode_ntlm_auth() argument 443 if (NTOWFv2(auth_data->user, auth_data->password, in encode_ntlm_auth() 593 encoder(auth_data->client_challenge, 8, auth_data); in encode_ntlm_auth() [all …]
|
H A D | ntlmssp.h | 4 struct auth_data; 6 struct auth_data * 14 ntlmssp_generate_blob(struct auth_data *auth_data, 19 ntlmssp_destroy_context(struct auth_data *auth); 21 int ntlmssp_get_session_key(struct auth_data *auth, uint8_t **key, uint8_t *key_size);
|
/dports/mail/mailutils/mailutils-3.13/examples/python/ |
H A D | auth.py | 60 auth_data = auth.get_auth_by_uid (key) variable 62 if not auth_data: 66 print("source: %s" % auth_data.source) 67 print("user name: %s" % auth_data.name) 68 print("password: %s" % auth_data.passwd) 69 print("uid: %d" % auth_data.uid) 70 print("gid: %d" % auth_data.gid) 71 print("gecos: %s" % auth_data.gecos) 72 print("home: %s" % auth_data.dir) 73 print("shell: %s" % auth_data.shell) [all …]
|
/dports/www/luakit-devel/luakit-2.3-20-g4b10e55/widgets/webview/ |
H A D | auth.c | 38 free_auth_data(LuakitAuthData *auth_data) in free_auth_data() argument 40 g_object_unref(auth_data->request); in free_auth_data() 41 g_slice_free(LuakitAuthData, auth_data); in free_auth_data() 49 luaH_object_push(L, auth_data->w->ref); in luakit_store_password() 62 luaH_object_push(L, auth_data->w->ref); in luakit_find_password() 97 free_auth_data(auth_data); in response_callback() 241 auth_data->checkbutton = checkbutton; in show_auth_dialog() 253 auth_data->request = request; in session_authenticate() 254 auth_data->w = w; in session_authenticate() 258 luakit_find_password(auth_data, &login, &password); in session_authenticate() [all …]
|
/dports/www/luakit/luakit-2.3/widgets/webview/ |
H A D | auth.c | 38 free_auth_data(LuakitAuthData *auth_data) in free_auth_data() argument 40 g_object_unref(auth_data->request); in free_auth_data() 41 g_slice_free(LuakitAuthData, auth_data); in free_auth_data() 49 luaH_object_push(L, auth_data->w->ref); in luakit_store_password() 62 luaH_object_push(L, auth_data->w->ref); in luakit_find_password() 97 free_auth_data(auth_data); in response_callback() 241 auth_data->checkbutton = checkbutton; in show_auth_dialog() 253 auth_data->request = request; in session_authenticate() 254 auth_data->w = w; in session_authenticate() 258 luakit_find_password(auth_data, &login, &password); in session_authenticate() [all …]
|
/dports/mail/mailutils/mailutils-3.13/pop3d/ |
H A D | user.c | 19 struct mu_auth_data *auth_data; variable 28 auth_data->name, auth_data->source); in pop3d_begin_session() 30 if (check_login_delay (auth_data->name)) in pop3d_begin_session() 34 auth_data->name); in pop3d_begin_session() 36 mu_auth_data_destroy (&auth_data); in pop3d_begin_session() 40 if (auth_data->change_uid) in pop3d_begin_session() 41 setuid (auth_data->uid); in pop3d_begin_session() 46 mu_auth_data_destroy (&auth_data); in pop3d_begin_session() 51 username = mu_strdup (auth_data->name); in pop3d_begin_session() 124 rc = mu_authenticate (auth_data, pass); in pop3d_user() [all …]
|
/dports/security/py-fido2/fido2-0.9.2/test/ |
H A D | test_attestation.py | 72 auth_data = AuthenticatorData( 77 res = attestation.verify({}, auth_data, b"deadbeef" * 8) 88 auth_data = AuthenticatorData( 93 res = attestation.verify({}, auth_data, b"deadbeef" * 8) 225 auth_data = AuthenticatorData( 252 auth_data = AuthenticatorData( 267 attestation.verify(statement, auth_data, client_param) 284 auth_data = AuthenticatorData( 299 attestation.verify(statement, auth_data, client_param) 310 auth_data = AuthenticatorData( [all …]
|
/dports/devel/py-keystoneauth1/keystoneauth1-4.4.0/keystoneauth1/identity/v3/ |
H A D | application_credential.py | 49 auth_data = {'secret': self.application_credential_secret} 52 auth_data['id'] = self.application_credential_id 54 auth_data['name'] = self.application_credential_name 55 auth_data['user'] = {} 57 auth_data['user']['id'] = self.user_id 59 auth_data['user']['name'] = self.username 62 auth_data['user']['domain'] = {'id': self.user_domain_id} 64 auth_data['user']['domain'] = { 67 return 'application_credential', auth_data
|
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silccore/ |
H A D | silcauth.c | 37 unsigned char *auth_data; member 102 const unsigned char *auth_data, in silc_auth_payload_encode() argument 119 auth_data = (const unsigned char *)autf8; in silc_auth_payload_encode() 151 if (payload->auth_data) { in silc_auth_payload_free() 153 silc_free(payload->auth_data); in silc_auth_payload_free() 185 return payload->auth_data; in silc_auth_get_data() 277 unsigned char auth_data[65536 + 1]; in silc_auth_public_key_auth_generate_wpub() local 301 auth_data, auth_len); in silc_auth_public_key_auth_generate_wpub() 304 memset(auth_data, 0, sizeof(auth_data)); in silc_auth_public_key_auth_generate_wpub() 406 if (!memcmp(payload->auth_data, auth_data, auth_data_len)) { in silc_auth_verify() [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/device/fido/ |
H A D | authenticator_data.cc | 28 base::span<const uint8_t> auth_data) { in DecodeAuthenticatorData() argument 29 if (auth_data.size() < kAttestedCredentialDataOffset) in DecodeAuthenticatorData() 31 auto application_parameter = auth_data.first<kRpIdHashLength>(); in DecodeAuthenticatorData() 32 uint8_t flag_byte = auth_data[kRpIdHashLength]; in DecodeAuthenticatorData() 34 auth_data.subspan<kRpIdHashLength + kFlagsLength, kSignCounterLength>(); in DecodeAuthenticatorData() 36 auth_data = auth_data.subspan(kAttestedCredentialDataOffset); in DecodeAuthenticatorData() 40 AttestedCredentialData::ConsumeFromCtapResponse(auth_data); in DecodeAuthenticatorData() 44 std::tie(attested_credential_data, auth_data) = std::move(*maybe_result); in DecodeAuthenticatorData() 50 extensions = cbor::Reader::Read(auth_data, &error); in DecodeAuthenticatorData() 55 << base::HexEncode(auth_data.data(), auth_data.size()); in DecodeAuthenticatorData() [all …]
|
/dports/security/py-fido2/fido2-0.9.2/examples/server/ |
H A D | server-u2f.py | 95 auth_data = server.register_complete(session["state"], client_data, att_obj) 97 credentials.append(auth_data.credential_data) 98 print("REGISTERED CREDENTIAL:", auth_data.credential_data) 107 auth_data, state = server.authenticate_begin(credentials) 109 return cbor.encode(auth_data) 120 auth_data = AuthenticatorData(data["authenticatorData"]) 123 print("AuthenticatorData", auth_data) 130 auth_data, 175 auth_data = att_obj.auth_data 177 credentials.append(auth_data.credential_data) [all …]
|
H A D | server.py | 94 auth_data = server.register_complete(session["state"], client_data, att_obj) 96 credentials.append(auth_data.credential_data) 97 print("REGISTERED CREDENTIAL:", auth_data.credential_data) 106 auth_data, state = server.authenticate_begin(credentials) 108 return cbor.encode(auth_data) 119 auth_data = AuthenticatorData(data["authenticatorData"]) 122 print("AuthenticatorData", auth_data) 129 auth_data,
|
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silcske/ |
H A D | silcconnauth.c | 38 void *auth_data; member 112 *auth_data = silc_calloc(len, sizeof(**auth_data)); in silc_connauth_get_signature() 113 if (*auth_data == NULL) { in silc_connauth_get_signature() 121 silc_free(*auth_data); in silc_connauth_get_signature() 291 auth_data = silc_memdup(connauth->auth_data, connauth->auth_data_len); in SILC_FSM_STATE() 292 if (!auth_data) { in SILC_FSM_STATE() 332 if (auth_data) { in SILC_FSM_STATE() 334 silc_free(auth_data); in SILC_FSM_STATE() 426 connauth->auth_data = auth_data; in silc_connauth_initiator() 582 if (!auth_data) { in SILC_FSM_STATE() [all …]
|
/dports/devel/grpc130/grpc-1.30.2/src/python/grpcio_tests/tests/unit/ |
H A D | _auth_context_test.py | 78 auth_data = pickle.loads(response) 79 self.assertIsNone(auth_data[_ID]) 80 self.assertIsNone(auth_data[_ID_KEY]) 81 self.assertDictEqual({}, auth_data[_AUTH_CTX]) 103 auth_data = pickle.loads(response) 104 self.assertIsNone(auth_data[_ID]) 105 self.assertIsNone(auth_data[_ID_KEY]) 111 }, auth_data[_AUTH_CTX]) 139 auth_data = pickle.loads(response) 140 auth_ctx = auth_data[_AUTH_CTX] [all …]
|
/dports/devel/grpc134/grpc-1.34.1/src/python/grpcio_tests/tests/unit/ |
H A D | _auth_context_test.py | 78 auth_data = pickle.loads(response) 79 self.assertIsNone(auth_data[_ID]) 80 self.assertIsNone(auth_data[_ID_KEY]) 81 self.assertDictEqual({}, auth_data[_AUTH_CTX]) 103 auth_data = pickle.loads(response) 104 self.assertIsNone(auth_data[_ID]) 105 self.assertIsNone(auth_data[_ID_KEY]) 111 }, auth_data[_AUTH_CTX]) 139 auth_data = pickle.loads(response) 140 auth_ctx = auth_data[_AUTH_CTX] [all …]
|
/dports/devel/grpc/grpc-1.42.0/src/python/grpcio_tests/tests/unit/ |
H A D | _auth_context_test.py | 78 auth_data = pickle.loads(response) 79 self.assertIsNone(auth_data[_ID]) 80 self.assertIsNone(auth_data[_ID_KEY]) 81 self.assertDictEqual({}, auth_data[_AUTH_CTX]) 103 auth_data = pickle.loads(response) 104 self.assertIsNone(auth_data[_ID]) 105 self.assertIsNone(auth_data[_ID_KEY]) 111 }, auth_data[_AUTH_CTX]) 139 auth_data = pickle.loads(response) 140 auth_ctx = auth_data[_AUTH_CTX] [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/grpc/src/src/python/grpcio_tests/tests/unit/ |
H A D | _auth_context_test.py | 78 auth_data = pickle.loads(response) 79 self.assertIsNone(auth_data[_ID]) 80 self.assertIsNone(auth_data[_ID_KEY]) 81 self.assertDictEqual({}, auth_data[_AUTH_CTX]) 104 auth_data = pickle.loads(response) 105 self.assertIsNone(auth_data[_ID]) 106 self.assertIsNone(auth_data[_ID_KEY]) 110 }, auth_data[_AUTH_CTX]) 139 auth_data = pickle.loads(response) 140 auth_ctx = auth_data[_AUTH_CTX] [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/device/fido/mac/ |
H A D | util_unittest.cc | 40 auto auth_data = in TEST() local 42 EXPECT_THAT(auth_data.counter(), ElementsAre(0x00, 0x00, 0x00, 0x00)); in TEST() 45 auth_data = MakeAuthenticatorData(rp_id, base::nullopt); in TEST() 46 EXPECT_THAT(auth_data.counter(), ElementsAre(0x00, 0x00, 0x00, 0x01)); in TEST() 48 auth_data = MakeAuthenticatorData(rp_id, base::nullopt); in TEST() 49 EXPECT_THAT(auth_data.counter(), ElementsAre(0x00, 0x00, 0x04, 0x01)); in TEST() 51 auth_data = MakeAuthenticatorData(rp_id, base::nullopt); in TEST() 52 EXPECT_THAT(auth_data.counter(), ElementsAre(0xff, 0xce, 0xdd, 0x80)); in TEST()
|
/dports/devel/grpc134/grpc-1.34.1/src/python/grpcio_tests/tests_aio/unit/ |
H A D | auth_context_test.py | 79 auth_data = pickle.loads(response) 80 self.assertIsNone(auth_data[_ID]) 81 self.assertIsNone(auth_data[_ID_KEY]) 82 self.assertDictEqual({}, auth_data[_AUTH_CTX]) 104 auth_data = pickle.loads(response) 105 self.assertIsNone(auth_data[_ID]) 106 self.assertIsNone(auth_data[_ID_KEY]) 112 }, auth_data[_AUTH_CTX]) 140 auth_data = pickle.loads(response) 141 auth_ctx = auth_data[_AUTH_CTX] [all …]
|
/dports/devel/grpc/grpc-1.42.0/src/python/grpcio_tests/tests_aio/unit/ |
H A D | auth_context_test.py | 79 auth_data = pickle.loads(response) 80 self.assertIsNone(auth_data[_ID]) 81 self.assertIsNone(auth_data[_ID_KEY]) 82 self.assertDictEqual({}, auth_data[_AUTH_CTX]) 104 auth_data = pickle.loads(response) 105 self.assertIsNone(auth_data[_ID]) 106 self.assertIsNone(auth_data[_ID_KEY]) 112 }, auth_data[_AUTH_CTX]) 140 auth_data = pickle.loads(response) 141 auth_ctx = auth_data[_AUTH_CTX] [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/device/fido/mac/ |
H A D | util_unittest.cc | 42 auto auth_data = in TEST() local 44 EXPECT_THAT(auth_data.counter(), ElementsAre(0x00, 0x00, 0x00, 0x00)); in TEST() 47 auth_data = MakeAuthenticatorData(rp_id, base::nullopt); in TEST() 48 EXPECT_THAT(auth_data.counter(), ElementsAre(0x00, 0x00, 0x00, 0x01)); in TEST() 50 auth_data = MakeAuthenticatorData(rp_id, base::nullopt); in TEST() 51 EXPECT_THAT(auth_data.counter(), ElementsAre(0x00, 0x00, 0x04, 0x01)); in TEST() 53 auth_data = MakeAuthenticatorData(rp_id, base::nullopt); in TEST() 54 EXPECT_THAT(auth_data.counter(), ElementsAre(0xff, 0xce, 0xdd, 0x80)); in TEST()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/device/fido/ |
H A D | authenticator_data.cc | 48 base::span<const uint8_t> auth_data) { in DecodeAuthenticatorData() argument 49 if (auth_data.size() < kAttestedCredentialDataOffset) in DecodeAuthenticatorData() 51 auto application_parameter = auth_data.first<kRpIdHashLength>(); in DecodeAuthenticatorData() 52 uint8_t flag_byte = auth_data[kRpIdHashLength]; in DecodeAuthenticatorData() 54 auth_data.subspan<kRpIdHashLength + kFlagsLength, kSignCounterLength>(); in DecodeAuthenticatorData() 56 auth_data = auth_data.subspan(kAttestedCredentialDataOffset); in DecodeAuthenticatorData() 60 AttestedCredentialData::ConsumeFromCtapResponse(auth_data); in DecodeAuthenticatorData() 64 std::tie(attested_credential_data, auth_data) = std::move(*maybe_result); in DecodeAuthenticatorData() 70 extensions = cbor::Reader::Read(auth_data, &error); in DecodeAuthenticatorData() 75 << base::HexEncode(auth_data.data(), auth_data.size()); in DecodeAuthenticatorData() [all …]
|
/dports/security/nmap/nmap-7.91/nselib/ |
H A D | ospf.lua | 43 auth_data = auth_data or {}, 61 header.auth_data.password = nil 67 …header.auth_data.keyid, header.auth_data.length, header.auth_data.seq = string.unpack(">BB I4", da… 69 header.auth_data.hash = hash 104 …auth = string.pack(">I2 BB I4", 0, self.auth_data.keyid, self.auth_data.length, self.auth_data.seq) 187 …self.header.auth_data.key = self.header.auth_data.key .. string.rep("\0", 16 - #self.header.auth_d… 188 self.header.auth_data.hash = openssl.md5(data .. self.header.auth_data.key) 386 …self.header.auth_data.key = self.header.auth_data.key .. string.rep("\0", 16 - #self.header.auth_d… 387 self.header.auth_data.hash = openssl.md5(data .. self.header.auth_data.key) 457 …self.header.auth_data.key = self.header.auth_data.key .. string.rep("\0", 16 - #self.header.auth_d… [all …]
|
/dports/mail/mailutils/mailutils-3.13/libmailutils/auth/ |
H A D | system.c | 101 const struct mu_auth_data *auth_data = key; in mu_authenticate_generic() local 105 if (!auth_data || !pass) in mu_authenticate_generic() 108 return auth_data->passwd && in mu_authenticate_generic() 109 (crypt_pass = crypt (pass, auth_data->passwd)) != NULL && in mu_authenticate_generic() 110 strcmp (auth_data->passwd, crypt_pass) == 0 ? in mu_authenticate_generic() 121 const struct mu_auth_data *auth_data = key; in mu_authenticate_system() local 126 if (auth_data) in mu_authenticate_system() 131 spw = getspnam (auth_data->name); in mu_authenticate_system()
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/mysql-test/suite/x/r/ |
H A D | connection_require_secure_transport.result | 10 auth_data: "\000x_root\000" 14 auth_data: "" 38 auth_data: "\000x_root\000" 42 auth_data: "" 48 auth_data: "\000x_root\000" 64 auth_data: "\000x_root\000" 77 auth_data: "\000x_root\000" 81 auth_data: ""
|