/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | SecureTransportPriv.h | 66 void *secret, // mallocd by caller, SSL_MASTER_SECRET_SIZE 91 const void *secret, 200 * master secret. 205 void *secret, /* mallocd by caller, SSL_MASTER_SECRET_SIZE */ 425 const void *secret,
|
/macosx-10.10/curl-83.1.2/curl/tests/certs/scripts/ |
H A D | genserv.sh | 71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret 75 $OPENSSL rsa -in $PREFIX-sv.key -out $PREFIX-sv.key -passin pass:secret
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/utils/ |
H A D | dbconverter-2.c | 63 const char *mechanism, const char *secret, 82 secret = secret + 17; 90 secret, seclen); 62 listusers_cb(const char *authid, const char *realm, const char *mechanism, const char *secret, unsigned seclen) argument
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth2-jpake.c | 267 * Fetch password hashing scheme, password salt and derive shared secret 276 u_char *secret; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 356 fatal("%s: BN_bin2bn (secret)", __func__); 363 bzero(secret, secret_len); 364 xfree(secret);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-41-sececkey.c | 325 CFDataRef secret = CFDataCreate(NULL, (void *)"0123456789012345", 16); local 326 ok(secret, "secret"); 340 CFDataRef wrapped = _SecKeyCopyWrapKey(pubKey, kSecKeyWrapPublicKeyPGP, secret, param, NULL, &localError); 348 ok(CFEqual(unwrapped, secret), "keys still same"); 351 CFReleaseNull(secret);
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnsextd_parser.y | 62 char secret[ 256 ]; 211 strncpy( keySpec->secret, $5, sizeof( keySpec->secret ) ); 490 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret ); 524 keylen = DNSDigest_ConstructHMACKeyfromBase64( authInfo, keySpec->secret );
|
/macosx-10.10/bind9-45.101/bind9/bin/rndc/ |
H A D | rndc.c | 80 static isccc_region_t secret; variable 230 DO("parse message", isccc_cc_fromwire(&source, &response, &secret)); 293 DO("parse message", isccc_cc_fromwire(&source, &response, &secret)); 320 DO("render message", isccc_cc_towire(request, &message, &secret)); 382 DO("render message", isccc_cc_towire(request, &message, &secret)); 557 (void)cfg_map_get(key, "secret", &secretobj); 560 fatal("key must have algorithm and secret"); 568 secret.rstart = (unsigned char *)secretarray; 569 secret.rend = (unsigned char *)secretarray + sizeof(secretarray); 570 DO("decode base64 secret", isccc_base64_decod [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | plugin_common.c | 289 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 291 if(!utils || !secret || !(*secret)) return; 293 utils->erasebuffer((char *)(*secret)->data, (unsigned int)((*secret)->len)); 294 utils->free(*secret); 295 *secret = NULL;
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/cmdline/ |
H A D | cmdline.tcl | 176 # in ".secret", it will not be displayed in the usage. 218 # in ".secret", it will not be displayed in the usage. 283 # in ".secret", it will not be displayed in the usage. 295 if {[regsub -- .secret$ $name {} name] == 1} { 330 if {[regsub -- .secret$ $name {} name] == 1} { 736 # appending the suffix ".secret" to any option specification. 737 # Please note that the ".secret" suffix must be the last suffix, 739 # foo.xdigit.multi.secret 752 if {[regsub -- {\.secret$} $name {} name] == 1} { 823 if {[regsub -- {\.secret [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-acl.conf | 47 rootpw secret
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/scripts/ |
H A D | test051-config-undo | 97 $LDAPMODIFY -D "cn=manager,o=undo" -w secret -h $LOCALHOST -p $PORT1 <<EOF
|
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | apps.h | 342 void jpake_client_auth(BIO *out, BIO *conn, const char *secret); 343 void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslEAP/ |
H A D | ringBufferThreads.cpp | 45 * Callback from ST to calculate master secret. 50 * ...to prove that both sides can come up with a master secret 51 * independently, using both sides' random values and the shared secret 60 void *secret, /* mallocd by caller, SSL_MASTER_SECRET_SIZE */ 65 printf("**Hey! insufficient space for master secret!\n"); 78 CC_SHA384_Final((unsigned char *)secret, &digestCtx); 57 sslMasterSecretFunction( SSLContextRef ctx, const void *arg, void *secret, size_t *secretLength) argument
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/autosign/ns1/ |
H A D | named.conf | 38 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/autosign/ns2/ |
H A D | named.conf | 38 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlvauto/ns2/ |
H A D | named.conf | 39 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dnssec/ns4/ |
H A D | named1.conf | 46 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/nsupdate/ns1/ |
H A D | named.conf | 36 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/stress/ns3/ |
H A D | named.conf | 36 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/tsiggss/ns1/ |
H A D | named.conf | 36 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/views/ns3/ |
H A D | named1.conf | 36 secret "1234abcd8765";
|
H A D | named2.conf | 36 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/xfer/ns2/ |
H A D | named.conf | 40 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/virtual-time/autosign-ksk/ns1/ |
H A D | named.conf | 37 secret "1234abcd8765";
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/virtual-time/autosign-zsk/ns1/ |
H A D | named.conf | 37 secret "1234abcd8765";
|