Searched refs:secret (Results 126 - 150 of 252) sorted by relevance

1234567891011

/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/
H A Ddnsextd_lexer.l67 secret return SECRET;
/macosx-10.10/ppp-786.1.1/Helpers/pppd/
H A Dauth.c780 error("No secret found for PAP login");
1458 "but I couldn't find any suitable secret (password) for it to use to do so.");
1555 char secret[MAXWORDLEN]; local
1586 * Open the file of pap secrets and scan for a suitable secret
1598 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1599 warning("no PAP secret found for %s", user);
1602 * If the secret is "@login", it means to check
1605 int login_secret = strcmp(secret, "@login") == 0;
1608 /* login option or secret is @login */
1612 if (secret[
1926 char secret[MAXWORDLEN]; local
1976 char secret[MAXWORDLEN]; local
[all...]
H A Dchap-new.c563 u_char secret[MAXSECRETLEN]; local
566 /* Get the secret that the peer is supposed to know */
567 if (!get_secret(0, name, ourname, secret, &secret_len, 1)) {
568 error("No CHAP secret found for authenticating %q", name);
572 ok = digest->verify_response(id, (char*)name, secret, secret_len, challenge,
574 memset(secret, 0, sizeof(secret));
591 u_char secret[MAXSECRETLEN+1]; local
612 /* get secret for authenticating ourselves with the specified host */
613 if (!get_secret(0, (u_char*)cs->name, rname, secret,
657 u_char secret[MAXSECRETLEN+1]; local
[all...]
H A Dchap.c462 char secret[MAXSECRETLEN]; local
499 /* get secret for authenticating ourselves with the specified host */
501 secret, &secret_len, 0)) {
502 secret_len = 0; /* assume null secret if can't find one */
503 warning("No CHAP secret found for authenticating us to %q", rhostname);
519 MD5Update(&mdContext, secret, secret_len);
528 ChapMS(cstate, rchallenge, secret, secret_len,
535 cstate->resp_name, secret, secret_len,
546 BZERO(secret, sizeof(secret));
566 char secret[MAXSECRETLEN]; local
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/isccc/
H A Dcc.c208 isccc_region_t *secret)
216 isc_hmacmd5_init(&ctx, secret->rstart, REGION_SIZE(*secret));
233 isccc_region_t *secret)
244 if (secret != NULL) {
266 if (secret != NULL)
268 hmd5_rstart, secret));
274 isccc_region_t *secret)
296 isc_hmacmd5_init(&ctx, secret->rstart, REGION_SIZE(*secret));
207 sign(unsigned char *data, unsigned int length, unsigned char *hmd5, isccc_region_t *secret) argument
232 isccc_cc_towire(isccc_sexpr_t *alist, isccc_region_t *target, isccc_region_t *secret) argument
273 verify(isccc_sexpr_t *alist, unsigned char *data, unsigned int length, isccc_region_t *secret) argument
363 table_fromwire(isccc_region_t *source, isccc_region_t *secret, isccc_sexpr_t **alistp) argument
448 isccc_cc_fromwire(isccc_region_t *source, isccc_sexpr_t **alistp, isccc_region_t *secret) argument
[all...]
/macosx-10.10/tcpdump-61/tcpdump/
H A Dprint-esp.c304 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
358 if (kCCSuccess != CCCryptorCreateFromCipherData(&sa->cipherData, kCCDecrypt, sa->secret, iv, &ctx))
366 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0)
437 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
524 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon);
529 if (i < sizeof(sa->secret)) {
530 memcpy(sa->secret, colon, i);
533 memcpy(sa->secret, colon, sizeof(sa->secret));
805 u_char *secret; local
[all...]
/macosx-10.10/Security-57031.1.35/securityd/securityd_service/securityd_service/
H A Dmain.c384 service_kb_create(service_context_t * context, const void * secret, int secret_len) argument
400 require_noerr(rc = aks_create_bag(secret, secret_len, kAppleKeyStoreDeviceBag, &session_handle), done);
407 if (secret && rc == KB_Success) {
408 aks_unlock_bag(session_handle, secret, secret_len);
460 service_kb_unlock(service_context_t * context, const void * secret, int secret_len) argument
466 rc = aks_unlock_bag(session_handle, secret, secret_len);
486 service_kb_change_secret(service_context_t * context, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument
498 require_noerr(rc = aks_change_secret(session_handle, secret, secret_len, new_secret, new_secret_len, NULL, NULL), done);
518 service_kb_reset(service_context_t * context, const void * secret, int secret_len) argument
535 require_noerr(rc = aks_create_bag(secret, secret_le
887 const uint8_t * secret = NULL, * new_secret = NULL; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/
H A Daclclient.cpp287 AclFactory::PWSubject::PWSubject(Allocator &alloc, const CssmData &secret) argument
290 append(new(alloc) ListElement(alloc, secret));
299 AclFactory::PromptPWSubject::PromptPWSubject(Allocator &alloc, const CssmData &prompt, const CssmData &secret) argument
303 append(new(alloc) ListElement(alloc, secret));
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/
H A Dacl_password.h40 // A PasswordAclSubject simply contains its secret.
41 // The environment is never consulted; we just compare against our known secret.
69 const TypedList &subject, CssmOwnedData &secret) const;
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Daclclient.cpp287 AclFactory::PWSubject::PWSubject(Allocator &alloc, const CssmData &secret) argument
290 append(new(alloc) ListElement(alloc, secret));
299 AclFactory::PromptPWSubject::PromptPWSubject(Allocator &alloc, const CssmData &prompt, const CssmData &secret) argument
303 append(new(alloc) ListElement(alloc, secret));
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dacl_password.h40 // A PasswordAclSubject simply contains its secret.
41 // The environment is never consulted; we just compare against our known secret.
69 const TypedList &subject, CssmOwnedData &secret) const;
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/acl/ns2/
H A Dnamed1.conf39 secret "1234abcd8765";
44 secret "1234abcd8765";
H A Dnamed2.conf39 secret "1234abcd8765";
44 secret "1234abcd8765";
H A Dnamed4.conf39 secret "1234abcd8765";
44 secret "1234abcd8765";
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/allow_query/ns2/
H A Dnamed40.conf27 secret "1234abcd8765";
32 secret "1234efgh8765";
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/xfer/ns3/
H A Dnamed.conf36 secret "1234abcd8765";
46 secret "1234abcd8765";
/macosx-10.10/cups-408/cups/data/
H A DMakefile25 secret \
/macosx-10.10/curl-83.1.2/curl/tests/certs/scripts/
H A Dgenroot.sh44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret
47 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
/macosx-10.10/mDNSResponder-561.1.1/mDNSWindows/ControlPanel/
H A DRegistrationPage.cpp297 BOOL secret = FALSE; local
312 secret = TRUE;
323 if ( secret )
377 if ( secret )
/macosx-10.10/OpenSSL098-52/src/crypto/jpake/
H A Djpake.c28 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
78 const BIGNUM *secret)
85 ctx->secret = BN_dup(secret);
106 BN_clear_free(ctx->secret);
118 const BIGNUM *secret)
122 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
362 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
400 BN_sub(t2, ctx->p.q, ctx->secret);
75 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
116 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/
H A Dkc-40-seckey.c146 uint8_t secret[max_len + 1], encrypted_secret[keySizeInBytes], decrypted_secret[keySizeInBytes]; local
147 uint8_t *secret_ptr = secret;
152 SecRandomCopyBytes(kSecRandomDefault, sizeof(secret), secret);
156 secret[0] = 0;
157 secret[1] = 128;
161 secret, sizeof(secret),
162 encrypted_secret, &encrypted_secret_len), errSecParam, "encrypt secret (overflow)");
164 secret, secret_le
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-40-seckey.c137 uint8_t secret[max_len + 1], encrypted_secret[keySizeInBytes], decrypted_secret[keySizeInBytes]; local
138 uint8_t *secret_ptr = secret;
143 SecRandomCopyBytes(kSecRandomDefault, sizeof(secret), secret);
147 secret[0] = 0;
148 secret[1] = 128;
152 secret, sizeof(secret),
153 encrypted_secret, &encrypted_secret_len), errSecParam, "encrypt secret (overflow)");
155 secret, secret_le
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/scripts/
H A Dtest052-memberof159 -D "cn=Manager,$BASEDN" -w secret \
211 -D "cn=Manager,$BASEDN" -w secret \
238 -D "cn=Manager,$BASEDN" -w secret \
259 -D "cn=Manager,$BASEDN" -w secret \
280 -D "cn=Manager,$BASEDN" -w secret \
301 -D "cn=Manager,$BASEDN" -w secret \
320 -D "cn=Manager,$BASEDN" -w secret \
339 -D "cn=Manager,$BASEDN" -w secret \
H A Dtest057-memberof-refint141 -D "cn=Manager,$BASEDN" -w secret \
193 -D "cn=Manager,$BASEDN" -w secret \
219 -D "cn=Manager,$BASEDN" -w secret \
243 -D "cn=Manager,$BASEDN" -w secret \
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/
H A Dslapd-dds.conf41 rootpw secret

Completed in 284 milliseconds

1234567891011