Searched refs:secret (Results 1 - 25 of 252) sorted by relevance

1234567891011

/macosx-10.10/bind9-45.101/bind9/bin/tests/
H A Dndc.conf-include22 secret "R29yZSBpbiAyMDA0IQo"; # "Gore in 2004!"
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/common/
H A Drndc.key20 secret "1234abcd8765";
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/sasldb/
H A Ddb_testw32.c66 * secret and match to the user's input. The win32 saslpwd program will
76 sasl_secret_t ** secret)
84 if (!auth_identity || !secret)
97 printf("Error reading secret length\n");
103 printf("Error reading secret data\n");
110 *secret = utils->malloc(sizeof(sasl_secret_t)
113 if (! *secret) {
117 (*secret)->len = the_len;
118 memcpy(&(*secret)->data, the_secret, the_len);
119 (*secret)
73 getsecret(const sasl_utils_t *utils, sasl_conn_t *context __attribute__((unused)), const char *auth_identity, sasl_secret_t ** secret) argument
127 putsecret(const sasl_utils_t *utils, sasl_conn_t *context __attribute__((unused)), const char *auth_identity, const sasl_secret_t * secret) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/
H A Dacl_secret.h26 // acl_secret - secret-validation password ACLs framework.
41 // passing their secret through some deterministic validation mechanism.
42 // As a limiting case, the subject can contain the secret itself and validate
48 // (1) How to OBTAIN the secret. This is the job of your subclass; SecretAclSubject
50 // (2) How to VALIDATE the secret. This is delegated to an environment method,
52 // (3) Whether to use a locally stored copy of the secret for validation (by equality)
54 // This implementation assumes that the secret, whatever it may be, can be stored
62 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &secret);
63 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &secret);
69 void secret(cons
88 const CssmData &secret() const { assert(mSecretValid); return mSecret; } function in class:Security::SecretAclSubject
[all...]
H A Dacl_secret.cpp26 // acl_secret - secret-validation password ACLs framework.
36 // Construct a secret-bearing ACL subject
58 // Set the secret after creation.
64 void SecretAclSubject::secret(const CssmData &s) const function in class:SecretAclSubject
70 secdebug("aclsecret", "%p secret stored", this);
72 secdebug("aclsecret", "%p refused to store secret", this);
75 void SecretAclSubject::secret(CssmManagedData &s) const function in class:SecretAclSubject
81 secdebug("aclsecret", "%p secret stored", this);
83 secdebug("aclsecret", "%p refused to store secret", this);
88 // Validate a secret
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dacl_secret.h26 // acl_secret - secret-validation password ACLs framework.
41 // passing their secret through some deterministic validation mechanism.
42 // As a limiting case, the subject can contain the secret itself and validate
48 // (1) How to OBTAIN the secret. This is the job of your subclass; SecretAclSubject
50 // (2) How to VALIDATE the secret. This is delegated to an environment method,
52 // (3) Whether to use a locally stored copy of the secret for validation (by equality)
54 // This implementation assumes that the secret, whatever it may be, can be stored
62 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &secret);
63 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &secret);
69 void secret(cons
88 const CssmData &secret() const { assert(mSecretValid); return mSecret; } function in class:Security::SecretAclSubject
[all...]
H A Dacl_secret.cpp26 // acl_secret - secret-validation password ACLs framework.
36 // Construct a secret-bearing ACL subject
58 // Set the secret after creation.
64 void SecretAclSubject::secret(const CssmData &s) const function in class:SecretAclSubject
70 secdebug("aclsecret", "%p secret stored", this);
72 secdebug("aclsecret", "%p refused to store secret", this);
75 void SecretAclSubject::secret(CssmManagedData &s) const function in class:SecretAclSubject
81 secdebug("aclsecret", "%p secret stored", this);
83 secdebug("aclsecret", "%p refused to store secret", this);
88 // Validate a secret
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/
H A Dslapd-config-undo.conf11 rootpw secret
H A Dslapd-chain1.conf38 credentials=secret
55 rootpw secret
H A Dslapd-chain2.conf44 rootpw secret
58 credentials=secret
H A Dslapd-deltasync-slave.conf36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
48 rootpw secret
61 credentials=secret
H A Dslapd-sql-syncrepl-master.conf51 rootpw secret
54 dbpasswd secret
H A Dslapd-sql.conf49 rootpw secret
52 dbpasswd secret
H A Dslapd-syncrepl-slave-persist1.conf36 #ldapyes#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
39 #ldapmod#chain-idassert-bind bindmethod=simple binddn="cn=Manager,dc=example,dc=com" credentials=secret mode=self
48 rootpw secret
62 credentials=secret
H A Dslapd-syncrepl-slave-persist2.conf25 rootpw secret
38 credentials=secret
H A Dslapd-syncrepl-slave-persist3.conf37 rootpw secret
50 credentials=secret
H A Dslapd-syncrepl-slave-refresh1.conf39 rootpw secret
53 credentials=secret
/macosx-10.10/libtelnet-13/
H A Dpk.h42 genkeys(char *public, char *secret)
43 common_key(char *secret, char *public, desData *deskey)
46 char secret[HEXKEYBYTES + 1];
55 extern void genkeys(char *public, char *secret);
56 extern void common_key(char *secret, char *public, IdeaData *common,
/macosx-10.10/Security-57031.1.35/securityd/securityd_service/securityd_service/
H A Dsecurityd_service_client.h30 int service_client_kb_create(service_context_t *context, const void * secret, int secret_len);
32 int service_client_kb_unlock(service_context_t *context, const void * secret, int secret_len);
34 int service_client_kb_change_secret(service_context_t *context, const void * secret, int secret_len, const void * new_secret, int new_secret_len);
36 int service_client_kb_reset(service_context_t *context, const void * secret, int secret_len);
/macosx-10.10/CPANInternal-159.1/Term-ReadPassword-0.11/t/
H A D2_interactive.t33 my $secret = '';
63 $secret = $new_pw;
72 if ($password eq $secret) {
78 print TTYOUT "# (But I'll tell you: The password is '$secret'.)\n";
/macosx-10.10/ppp-786.1.1/Authenticators/Radius/
H A Dradius.h41 char *secret; member in struct:auth_server
58 int radius_decryptmppekey(char *key, u_int8_t *attr_value, size_t attr_len, char *secret, char *authenticator, size_t auth_len);
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/tsig/ns1/
H A Dnamed.conf34 secret "97rnFx24Tfna4mHPfgnerA==";
39 secret "FrSt77yPTFx6hTs4i2tKLB9LmE0=";
44 secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA==";
49 secret "R16NojROxtxH/xbDl//ehDsHm5DjWTQ2YXV+hGC2iBY=";
54 secret "OaDdoAk2LAcLtYeUnsT7A9XHjsb6ZEma7OCvUpMraQIJX6HetGrlKmF7yglO1G2h";
59 secret "jI/Pa4qRu96t76Pns5Z/Ndxbn3QCkwcxLOgt9vgvnJw5wqTRvNyk3FtD6yIMd1dWVlqZ+Y4fe6Uasc0ckctEmg==";
64 secret "97rnFx24Tfna4mHPfgnerA==";
69 secret "FrSt77yPTFx6hTs4i2tKLB9LmE0=";
74 secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA==";
79 secret "R16NojROxtx
[all...]
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/xfer/ns4/
H A Dnamed.conf.base32 secret "1234abcd8765";
37 secret "1234abcd8765";
42 secret "LSAnCU+Z";
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/
H A Dsafefile.c48 safefile(path, secret)
50 int secret;
83 /* secret file should not be read by others */
84 if (secret) {
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/regressions/its4448/
H A Dslapd-meta.conf49 rootpw secret
57 credentials=secret

Completed in 140 milliseconds

1234567891011