/macosx-10.10/bind9-45.101/bind9/bin/tests/ |
H A D | ndc.conf-include | 22 secret "R29yZSBpbiAyMDA0IQo"; # "Gore in 2004!"
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/common/ |
H A D | rndc.key | 20 secret "1234abcd8765";
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/sasldb/ |
H A D | db_testw32.c | 66 * secret and match to the user's input. The win32 saslpwd program will 76 sasl_secret_t ** secret) 84 if (!auth_identity || !secret) 97 printf("Error reading secret length\n"); 103 printf("Error reading secret data\n"); 110 *secret = utils->malloc(sizeof(sasl_secret_t) 113 if (! *secret) { 117 (*secret)->len = the_len; 118 memcpy(&(*secret)->data, the_secret, the_len); 119 (*secret) 73 getsecret(const sasl_utils_t *utils, sasl_conn_t *context __attribute__((unused)), const char *auth_identity, sasl_secret_t ** secret) argument 127 putsecret(const sasl_utils_t *utils, sasl_conn_t *context __attribute__((unused)), const char *auth_identity, const sasl_secret_t * secret) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | acl_secret.h | 26 // acl_secret - secret-validation password ACLs framework. 41 // passing their secret through some deterministic validation mechanism. 42 // As a limiting case, the subject can contain the secret itself and validate 48 // (1) How to OBTAIN the secret. This is the job of your subclass; SecretAclSubject 50 // (2) How to VALIDATE the secret. This is delegated to an environment method, 52 // (3) Whether to use a locally stored copy of the secret for validation (by equality) 54 // This implementation assumes that the secret, whatever it may be, can be stored 62 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &secret); 63 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &secret); 69 void secret(cons 88 const CssmData &secret() const { assert(mSecretValid); return mSecret; } function in class:Security::SecretAclSubject [all...] |
H A D | acl_secret.cpp | 26 // acl_secret - secret-validation password ACLs framework. 36 // Construct a secret-bearing ACL subject 58 // Set the secret after creation. 64 void SecretAclSubject::secret(const CssmData &s) const function in class:SecretAclSubject 70 secdebug("aclsecret", "%p secret stored", this); 72 secdebug("aclsecret", "%p refused to store secret", this); 75 void SecretAclSubject::secret(CssmManagedData &s) const function in class:SecretAclSubject 81 secdebug("aclsecret", "%p secret stored", this); 83 secdebug("aclsecret", "%p refused to store secret", this); 88 // Validate a secret [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | acl_secret.h | 26 // acl_secret - secret-validation password ACLs framework. 41 // passing their secret through some deterministic validation mechanism. 42 // As a limiting case, the subject can contain the secret itself and validate 48 // (1) How to OBTAIN the secret. This is the job of your subclass; SecretAclSubject 50 // (2) How to VALIDATE the secret. This is delegated to an environment method, 52 // (3) Whether to use a locally stored copy of the secret for validation (by equality) 54 // This implementation assumes that the secret, whatever it may be, can be stored 62 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &secret); 63 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &secret); 69 void secret(cons 88 const CssmData &secret() const { assert(mSecretValid); return mSecret; } function in class:Security::SecretAclSubject [all...] |
H A D | acl_secret.cpp | 26 // acl_secret - secret-validation password ACLs framework. 36 // Construct a secret-bearing ACL subject 58 // Set the secret after creation. 64 void SecretAclSubject::secret(const CssmData &s) const function in class:SecretAclSubject 70 secdebug("aclsecret", "%p secret stored", this); 72 secdebug("aclsecret", "%p refused to store secret", this); 75 void SecretAclSubject::secret(CssmManagedData &s) const function in class:SecretAclSubject 81 secdebug("aclsecret", "%p secret stored", this); 83 secdebug("aclsecret", "%p refused to store secret", this); 88 // Validate a secret [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-config-undo.conf | 11 rootpw secret
|
H A D | slapd-chain1.conf | 38 credentials=secret 55 rootpw secret
|
H A D | slapd-chain2.conf | 44 rootpw secret 58 credentials=secret
|
H A D | slapd-deltasync-slave.conf | 36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 48 rootpw secret 61 credentials=secret
|
H A D | slapd-sql-syncrepl-master.conf | 51 rootpw secret 54 dbpasswd secret
|
H A D | slapd-sql.conf | 49 rootpw secret 52 dbpasswd secret
|
H A D | slapd-syncrepl-slave-persist1.conf | 36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self 48 rootpw secret 62 credentials=secret
|
H A D | slapd-syncrepl-slave-persist2.conf | 25 rootpw secret 38 credentials=secret
|
H A D | slapd-syncrepl-slave-persist3.conf | 37 rootpw secret 50 credentials=secret
|
H A D | slapd-syncrepl-slave-refresh1.conf | 39 rootpw secret 53 credentials=secret
|
/macosx-10.10/libtelnet-13/ |
H A D | pk.h | 42 genkeys(char *public, char *secret) 43 common_key(char *secret, char *public, desData *deskey) 46 char secret[HEXKEYBYTES + 1]; 55 extern void genkeys(char *public, char *secret); 56 extern void common_key(char *secret, char *public, IdeaData *common,
|
/macosx-10.10/Security-57031.1.35/securityd/securityd_service/securityd_service/ |
H A D | securityd_service_client.h | 30 int service_client_kb_create(service_context_t *context, const void * secret, int secret_len); 32 int service_client_kb_unlock(service_context_t *context, const void * secret, int secret_len); 34 int service_client_kb_change_secret(service_context_t *context, const void * secret, int secret_len, const void * new_secret, int new_secret_len); 36 int service_client_kb_reset(service_context_t *context, const void * secret, int secret_len);
|
/macosx-10.10/CPANInternal-159.1/Term-ReadPassword-0.11/t/ |
H A D | 2_interactive.t | 33 my $secret = ''; 63 $secret = $new_pw; 72 if ($password eq $secret) { 78 print TTYOUT "# (But I'll tell you: The password is '$secret'.)\n";
|
/macosx-10.10/ppp-786.1.1/Authenticators/Radius/ |
H A D | radius.h | 41 char *secret; member in struct:auth_server 58 int radius_decryptmppekey(char *key, u_int8_t *attr_value, size_t attr_len, char *secret, char *authenticator, size_t auth_len);
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/tsig/ns1/ |
H A D | named.conf | 34 secret "97rnFx24Tfna4mHPfgnerA=="; 39 secret "FrSt77yPTFx6hTs4i2tKLB9LmE0="; 44 secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA=="; 49 secret "R16NojROxtxH/xbDl//ehDsHm5DjWTQ2YXV+hGC2iBY="; 54 secret "OaDdoAk2LAcLtYeUnsT7A9XHjsb6ZEma7OCvUpMraQIJX6HetGrlKmF7yglO1G2h"; 59 secret "jI/Pa4qRu96t76Pns5Z/Ndxbn3QCkwcxLOgt9vgvnJw5wqTRvNyk3FtD6yIMd1dWVlqZ+Y4fe6Uasc0ckctEmg=="; 64 secret "97rnFx24Tfna4mHPfgnerA=="; 69 secret "FrSt77yPTFx6hTs4i2tKLB9LmE0="; 74 secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA=="; 79 secret "R16NojROxtx [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/xfer/ns4/ |
H A D | named.conf.base | 32 secret "1234abcd8765"; 37 secret "1234abcd8765"; 42 secret "LSAnCU+Z";
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | safefile.c | 48 safefile(path, secret) 50 int secret; 83 /* secret file should not be read by others */ 84 if (secret) {
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/regressions/its4448/ |
H A D | slapd-meta.conf | 49 rootpw secret 57 credentials=secret
|