/dports/security/py-certbot/certbot-1.22.0/certbot/_internal/plugins/ |
H A D | selection.py | 294 req_auth = set_configurator(req_auth, "nginx") 297 req_auth = set_configurator(req_auth, "apache") 299 req_auth = set_configurator(req_auth, "standalone") 301 req_auth = set_configurator(req_auth, "webroot") 303 req_auth = set_configurator(req_auth, "manual") 315 req_auth = set_configurator(req_auth, "dns-gehirn") 317 req_auth = set_configurator(req_auth, "dns-google") 319 req_auth = set_configurator(req_auth, "dns-linode") 321 req_auth = set_configurator(req_auth, "dns-luadns") 323 req_auth = set_configurator(req_auth, "dns-nsone") [all …]
|
/dports/security/tpm2-tss/tpm2-tss-3.1.0/test/integration/ |
H A D | sys-param-encrypt-decrypt.int.c | 44 TSS2L_SYS_AUTH_COMMAND req_auth = { in test_invoke() local 105 req_auth.count = 2; in test_invoke() 108 req_auth.auths[0].nonce.size = 0; in test_invoke() 109 req_auth.auths[0].sessionAttributes = 0; in test_invoke() 110 req_auth.auths[0].hmac.size = nv_auth.size; in test_invoke() 112 req_auth.auths[0].hmac.size); in test_invoke() 116 req_auth.auths[1].nonce.size = 0; in test_invoke() 118 req_auth.auths[1].hmac.size = 0; in test_invoke() 179 req_auth.count = 1; in test_invoke() 206 req_auth.count = 2; in test_invoke() [all …]
|
/dports/net/istgt/istgt-20150713/src/ |
H A D | istgtcontrol.c | 108 int req_auth; member 982 uctl->req_auth = 0; in uctl_init() 1102 int req_auth = -1; in main() local 1155 req_auth = 1; in main() 1159 req_auth = 2; in main() 1161 req_auth = 0; in main() 1301 if (req_auth >= 0) { in main() 1303 uctl->req_auth = 0; in main() 1305 if (req_auth > 1) { in main() 1307 uctl->req_auth = 1; in main() [all …]
|
H A D | istgt_iscsi.h | 274 int req_auth; member
|
/dports/www/p5-LWP-Protocol-https/LWP-Protocol-https-6.10/t/ |
H A D | https_proxy.t | 276 my $req_auth = $req =~m{^Proxy-Authorization:}mi ? '.auth':''; 284 $tunnel_auth = $req_auth ? '.Tauth':''; 301 my $body = "ID: $connid.$reqid$tunnel_auth$req_auth\@"
|
/dports/java/eclipse/eclipse.platform.releng.aggregator-R4_16/rt.equinox.bundles/bundles/org.eclipse.equinox.ip/src/org/eclipse/equinox/internal/ip/provider/http/ |
H A D | HttpProvider.java | 231 boolean req_auth = false; in doPost() 234 req_auth = true; in doPost() 236 if (!req_auth && !checkAccount(user, pass)) { in doPost()
|
/dports/net/samba412/samba-4.12.15/libcli/auth/ |
H A D | netlogon_creds_cli.c | 1550 &state->req_auth); in netlogon_creds_cli_check_send() 1560 &state->req_auth, in netlogon_creds_cli_check_send() 1988 &state->req_auth); in netlogon_creds_cli_ServerPasswordSet_locked() 2025 &state->req_auth, in netlogon_creds_cli_ServerPasswordSet_locked() 2047 &state->req_auth, in netlogon_creds_cli_ServerPasswordSet_locked() 2465 &state->req_auth, in netlogon_creds_cli_LogonSamLogon_start() 2485 &state->req_auth, in netlogon_creds_cli_LogonSamLogon_start() 3137 &state->req_auth, in netlogon_creds_cli_ServerGetTrustInfo_locked() 3448 &state->req_auth, in netlogon_creds_cli_GetForestTrustInformation_locked() 3746 &state->req_auth, in netlogon_creds_cli_SendToSam_locked() [all …]
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/presence_profile/ |
H A D | add_events.c | 54 event.req_auth = 0; in profile_add_events()
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/presence_reginfo/ |
H A D | add_events.c | 44 event.req_auth = 0; in reginfo_add_events()
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/presence_conference/ |
H A D | add_events.c | 48 event.req_auth = 0; in conference_add_events()
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/presence_dialoginfo/ |
H A D | add_events.c | 48 event.req_auth = 0; in dlginfo_add_events()
|
/dports/net-mgmt/coovachilli/coova-chilli-1.0.12/src/ |
H A D | radius.c | 166 uint8_t *req_auth, in radius_authresp_authenticator() argument 175 memcpy(pack->authenticator, req_auth, RADIUS_AUTHLEN); in radius_authresp_authenticator() 1306 struct sockaddr_in *peer, uint8_t *req_auth) { in radius_resp() argument 1313 memcpy(pack->authenticator, req_auth, RADIUS_AUTHLEN); in radius_resp() 1320 radius_authresp_authenticator(this, pack, req_auth, in radius_resp() 1339 struct sockaddr_in *peer, uint8_t *req_auth) { in radius_coaresp() argument 1346 memcpy(pack->authenticator, req_auth, RADIUS_AUTHLEN); in radius_coaresp() 1353 radius_authresp_authenticator(this, pack, req_auth, in radius_coaresp()
|
H A D | radius.h | 311 struct sockaddr_in *peer, uint8_t *req_auth); 316 struct sockaddr_in *peer, uint8_t *req_auth);
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/presence/ |
H A D | event_list.c | 214 if(event->req_auth in add_event() 219 ev->req_auth = event->req_auth; in add_event()
|
H A D | event_list.h | 97 int req_auth; member
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/presence_mwi/ |
H A D | add_events.c | 129 event.req_auth = 0; in mwi_add_events()
|
/dports/net/freediameter/freeDiameter-1.5.0/extensions/app_radgw/ |
H A D | rgw.h | 97 …_clients_auth_check(struct rgw_radius_msg_meta * msg, struct rgw_client * cli, uint8_t * req_auth);
|
H A D | radius.h | 269 size_t secret_len, const u8 *req_auth);
|
H A D | radius.c | 685 size_t secret_len, const u8 *req_auth) in radius_msg_verify_msg_auth() argument 710 if (req_auth) { in radius_msg_verify_msg_auth() 713 os_memcpy(msg->hdr->authenticator, req_auth, in radius_msg_verify_msg_auth() 718 if (req_auth) { in radius_msg_verify_msg_auth()
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/presence_xml/ |
H A D | add_events.c | 62 event.req_auth = 1; in xml_add_events()
|
/dports/devel/brz/breezy-3.2.0/breezy/transport/http/ |
H A D | urllib.py | 1518 req_auth = urllib_request.parse_keqv_list( 1522 qop = req_auth.get('qop', None) 1526 H, KD = get_digest_algorithm_impls(req_auth.get('algorithm', 'MD5')) 1530 realm = req_auth.get('realm', None) 1540 if req_auth.get('algorithm', None) is not None: 1541 self.update_auth(auth, 'algorithm', req_auth.get('algorithm')) 1542 nonce = req_auth['nonce'] 1548 auth['opaque'] = req_auth.get('opaque', None)
|
/dports/security/trousers/trousers-0.3.14_3/src/tspi/ |
H A D | tsp_auth.c | 777 TSS_BOOL authdatausage = FALSE, req_auth = TRUE, get_child_auth = TRUE, secret_set = FALSE; in authsess_xsap_init() local 803 req_auth = FALSE; in authsess_xsap_init() 904 req_auth = requirements; in authsess_xsap_init() 906 if (req_auth) { in authsess_xsap_init() 963 if (req_auth == FALSE && sess->parentMode == TSS_SECRET_MODE_NONE) in authsess_xsap_init()
|
/dports/net/hostapd/hostapd-2.9/src/radius/ |
H A D | radius.c | 800 size_t secret_len, const u8 *req_auth) in radius_msg_verify_msg_auth() argument 825 if (req_auth) { in radius_msg_verify_msg_auth() 828 os_memcpy(msg->hdr->authenticator, req_auth, in radius_msg_verify_msg_auth() 835 if (req_auth) { in radius_msg_verify_msg_auth()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/radius/ |
H A D | radius.c | 800 size_t secret_len, const u8 *req_auth) in radius_msg_verify_msg_auth() argument 825 if (req_auth) { in radius_msg_verify_msg_auth() 828 os_memcpy(msg->hdr->authenticator, req_auth, in radius_msg_verify_msg_auth() 835 if (req_auth) { in radius_msg_verify_msg_auth()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/radius/ |
H A D | radius.c | 800 size_t secret_len, const u8 *req_auth) in radius_msg_verify_msg_auth() argument 825 if (req_auth) { in radius_msg_verify_msg_auth() 828 os_memcpy(msg->hdr->authenticator, req_auth, in radius_msg_verify_msg_auth() 835 if (req_auth) { in radius_msg_verify_msg_auth()
|