/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnsextd_lexer.l | 67 secret return SECRET;
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | auth.c | 780 error("No secret found for PAP login"); 1458 "but I couldn't find any suitable secret (password) for it to use to do so."); 1555 char secret[MAXWORDLEN]; local 1586 * Open the file of pap secrets and scan for a suitable secret 1598 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1599 warning("no PAP secret found for %s", user); 1602 * If the secret is "@login", it means to check 1605 int login_secret = strcmp(secret, "@login") == 0; 1608 /* login option or secret is @login */ 1612 if (secret[ 1926 char secret[MAXWORDLEN]; local 1976 char secret[MAXWORDLEN]; local [all...] |
H A D | chap-new.c | 563 u_char secret[MAXSECRETLEN]; local 566 /* Get the secret that the peer is supposed to know */ 567 if (!get_secret(0, name, ourname, secret, &secret_len, 1)) { 568 error("No CHAP secret found for authenticating %q", name); 572 ok = digest->verify_response(id, (char*)name, secret, secret_len, challenge, 574 memset(secret, 0, sizeof(secret)); 591 u_char secret[MAXSECRETLEN+1]; local 612 /* get secret for authenticating ourselves with the specified host */ 613 if (!get_secret(0, (u_char*)cs->name, rname, secret, 657 u_char secret[MAXSECRETLEN+1]; local [all...] |
H A D | chap.c | 462 char secret[MAXSECRETLEN]; local 499 /* get secret for authenticating ourselves with the specified host */ 501 secret, &secret_len, 0)) { 502 secret_len = 0; /* assume null secret if can't find one */ 503 warning("No CHAP secret found for authenticating us to %q", rhostname); 519 MD5Update(&mdContext, secret, secret_len); 528 ChapMS(cstate, rchallenge, secret, secret_len, 535 cstate->resp_name, secret, secret_len, 546 BZERO(secret, sizeof(secret)); 566 char secret[MAXSECRETLEN]; local [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/isccc/ |
H A D | cc.c | 208 isccc_region_t *secret) 216 isc_hmacmd5_init(&ctx, secret->rstart, REGION_SIZE(*secret)); 233 isccc_region_t *secret) 244 if (secret != NULL) { 266 if (secret != NULL) 268 hmd5_rstart, secret)); 274 isccc_region_t *secret) 296 isc_hmacmd5_init(&ctx, secret->rstart, REGION_SIZE(*secret)); 207 sign(unsigned char *data, unsigned int length, unsigned char *hmd5, isccc_region_t *secret) argument 232 isccc_cc_towire(isccc_sexpr_t *alist, isccc_region_t *target, isccc_region_t *secret) argument 273 verify(isccc_sexpr_t *alist, unsigned char *data, unsigned int length, isccc_region_t *secret) argument 363 table_fromwire(isccc_region_t *source, isccc_region_t *secret, isccc_sexpr_t **alistp) argument 448 isccc_cc_fromwire(isccc_region_t *source, isccc_sexpr_t **alistp, isccc_region_t *secret) argument [all...] |
/macosx-10.10/tcpdump-61/tcpdump/ |
H A D | print-esp.c | 304 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 358 if (kCCSuccess != CCCryptorCreateFromCipherData(&sa->cipherData, kCCDecrypt, sa->secret, iv, &ctx)) 366 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0) 437 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 524 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); 529 if (i < sizeof(sa->secret)) { 530 memcpy(sa->secret, colon, i); 533 memcpy(sa->secret, colon, sizeof(sa->secret)); 805 u_char *secret; local [all...] |
/macosx-10.10/Security-57031.1.35/securityd/securityd_service/securityd_service/ |
H A D | main.c | 384 service_kb_create(service_context_t * context, const void * secret, int secret_len) argument 400 require_noerr(rc = aks_create_bag(secret, secret_len, kAppleKeyStoreDeviceBag, &session_handle), done); 407 if (secret && rc == KB_Success) { 408 aks_unlock_bag(session_handle, secret, secret_len); 460 service_kb_unlock(service_context_t * context, const void * secret, int secret_len) argument 466 rc = aks_unlock_bag(session_handle, secret, secret_len); 486 service_kb_change_secret(service_context_t * context, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument 498 require_noerr(rc = aks_change_secret(session_handle, secret, secret_len, new_secret, new_secret_len, NULL, NULL), done); 518 service_kb_reset(service_context_t * context, const void * secret, int secret_len) argument 535 require_noerr(rc = aks_create_bag(secret, secret_le 887 const uint8_t * secret = NULL, * new_secret = NULL; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | aclclient.cpp | 287 AclFactory::PWSubject::PWSubject(Allocator &alloc, const CssmData &secret) argument 290 append(new(alloc) ListElement(alloc, secret)); 299 AclFactory::PromptPWSubject::PromptPWSubject(Allocator &alloc, const CssmData &prompt, const CssmData &secret) argument 303 append(new(alloc) ListElement(alloc, secret));
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | acl_password.h | 40 // A PasswordAclSubject simply contains its secret. 41 // The environment is never consulted; we just compare against our known secret. 69 const TypedList &subject, CssmOwnedData &secret) const;
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | aclclient.cpp | 287 AclFactory::PWSubject::PWSubject(Allocator &alloc, const CssmData &secret) argument 290 append(new(alloc) ListElement(alloc, secret)); 299 AclFactory::PromptPWSubject::PromptPWSubject(Allocator &alloc, const CssmData &prompt, const CssmData &secret) argument 303 append(new(alloc) ListElement(alloc, secret));
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | acl_password.h | 40 // A PasswordAclSubject simply contains its secret. 41 // The environment is never consulted; we just compare against our known secret. 69 const TypedList &subject, CssmOwnedData &secret) const;
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/acl/ns2/ |
H A D | named1.conf | 39 secret "1234abcd8765"; 44 secret "1234abcd8765";
|
H A D | named2.conf | 39 secret "1234abcd8765"; 44 secret "1234abcd8765";
|
H A D | named4.conf | 39 secret "1234abcd8765"; 44 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/allow_query/ns2/ |
H A D | named40.conf | 27 secret "1234abcd8765"; 32 secret "1234efgh8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/xfer/ns3/ |
H A D | named.conf | 36 secret "1234abcd8765"; 46 secret "1234abcd8765";
|
/macosx-10.10/cups-408/cups/data/ |
H A D | Makefile | 25 secret \
|
/macosx-10.10/curl-83.1.2/curl/tests/certs/scripts/ |
H A D | genroot.sh | 44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret 47 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSWindows/ControlPanel/ |
H A D | RegistrationPage.cpp | 297 BOOL secret = FALSE; local 312 secret = TRUE; 323 if ( secret ) 377 if ( secret )
|
/macosx-10.10/OpenSSL098-52/src/crypto/jpake/ |
H A D | jpake.c | 28 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 78 const BIGNUM *secret) 85 ctx->secret = BN_dup(secret); 106 BN_clear_free(ctx->secret); 118 const BIGNUM *secret) 122 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret); 362 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx); 400 BN_sub(t2, ctx->p.q, ctx->secret); 75 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument 116 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-40-seckey.c | 146 uint8_t secret[max_len + 1], encrypted_secret[keySizeInBytes], decrypted_secret[keySizeInBytes]; local 147 uint8_t *secret_ptr = secret; 152 SecRandomCopyBytes(kSecRandomDefault, sizeof(secret), secret); 156 secret[0] = 0; 157 secret[1] = 128; 161 secret, sizeof(secret), 162 encrypted_secret, &encrypted_secret_len), errSecParam, "encrypt secret (overflow)"); 164 secret, secret_le [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey.c | 137 uint8_t secret[max_len + 1], encrypted_secret[keySizeInBytes], decrypted_secret[keySizeInBytes]; local 138 uint8_t *secret_ptr = secret; 143 SecRandomCopyBytes(kSecRandomDefault, sizeof(secret), secret); 147 secret[0] = 0; 148 secret[1] = 128; 152 secret, sizeof(secret), 153 encrypted_secret, &encrypted_secret_len), errSecParam, "encrypt secret (overflow)"); 155 secret, secret_le [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/scripts/ |
H A D | test052-memberof | 159 -D "cn=Manager,$BASEDN" -w secret \ 211 -D "cn=Manager,$BASEDN" -w secret \ 238 -D "cn=Manager,$BASEDN" -w secret \ 259 -D "cn=Manager,$BASEDN" -w secret \ 280 -D "cn=Manager,$BASEDN" -w secret \ 301 -D "cn=Manager,$BASEDN" -w secret \ 320 -D "cn=Manager,$BASEDN" -w secret \ 339 -D "cn=Manager,$BASEDN" -w secret \
|
H A D | test057-memberof-refint | 141 -D "cn=Manager,$BASEDN" -w secret \ 193 -D "cn=Manager,$BASEDN" -w secret \ 219 -D "cn=Manager,$BASEDN" -w secret \ 243 -D "cn=Manager,$BASEDN" -w secret \
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-dds.conf | 41 rootpw secret
|