Searched refs:secret_len (Results 1 - 15 of 15) sorted by relevance

/macosx-10.10/Security-57031.1.35/securityd/securityd_service/securityd_service/
H A Dsecurityd_service_client.h30 int service_client_kb_create(service_context_t *context, const void * secret, int secret_len);
32 int service_client_kb_unlock(service_context_t *context, const void * secret, int secret_len);
34 int service_client_kb_change_secret(service_context_t *context, const void * secret, int secret_len, const void * new_secret, int new_secret_len);
36 int service_client_kb_reset(service_context_t *context, const void * secret, int secret_len);
H A Dsecurityd_service_client.c73 _service_client_send_secret(service_context_t *context, uint64_t request, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument
83 xpc_dictionary_set_data(message, SERVICE_XPC_SECRET, secret, secret_len);
98 service_client_kb_create(service_context_t *context, const void * secret, int secret_len) argument
100 return _service_client_send_secret(context, SERVICE_KB_CREATE, secret, secret_len, NULL, 0);
110 service_client_kb_unlock(service_context_t *context, const void * secret, int secret_len) argument
112 return _service_client_send_secret(context, SERVICE_KB_UNLOCK, secret, secret_len, NULL, 0);
122 service_client_kb_change_secret(service_context_t *context, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument
124 return _service_client_send_secret(context, SERVICE_KB_CHANGE_SECRET, secret, secret_len, new_secret, new_secret_len);
128 service_client_kb_reset(service_context_t *context, const void * secret, int secret_len) argument
130 return _service_client_send_secret(context, SERVICE_KB_RESET, secret, secret_len, NUL
[all...]
H A Dmain.c384 service_kb_create(service_context_t * context, const void * secret, int secret_len) argument
400 require_noerr(rc = aks_create_bag(secret, secret_len, kAppleKeyStoreDeviceBag, &session_handle), done);
408 aks_unlock_bag(session_handle, secret, secret_len);
460 service_kb_unlock(service_context_t * context, const void * secret, int secret_len) argument
466 rc = aks_unlock_bag(session_handle, secret, secret_len);
486 service_kb_change_secret(service_context_t * context, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument
498 require_noerr(rc = aks_change_secret(session_handle, secret, secret_len, new_secret, new_secret_len, NULL, NULL), done);
518 service_kb_reset(service_context_t * context, const void * secret, int secret_len) argument
535 require_noerr(rc = aks_create_bag(secret, secret_len, kAppleKeyStoreDeviceBag, &session_handle), done);
543 aks_unlock_bag(session_handle, secret, secret_len);
888 size_t secret_len = 0, new_secret_len = 0, data_len = 0; local
[all...]
/macosx-10.10/ppp-786.1.1/Helpers/pppd/
H A Dchap-md5.c83 unsigned char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
114 unsigned char *challenge, u_char *secret, int secret_len,
123 MD5_Update(&ctx, secret, secret_len);
82 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
113 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h132 unsigned char *secret, int secret_len,
136 unsigned char *challenge, u_char *secret, int secret_len,
142 unsigned char *status_pkt, u_char *secret, int secret_len,
146 unsigned char *status_pkt, u_char *secret, int secret_len,
H A Dchap_ms.c222 unsigned char *secret, int secret_len,
247 ChapMS(challenge, secret, secret_len, &md);
272 unsigned char *secret, int secret_len,
290 secret, secret_len, &md,
351 unsigned char *challenge, u_char *secret, int secret_len,
356 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response);
361 unsigned char *challenge, u_char *secret, int secret_len,
391 secret, secret_len,
576 u_char *secret, int secret_len,
596 secret, secret_len,
221 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
271 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
350 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
360 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
574 chapms2_change_password(unsigned char *response, char *our_name, unsigned char *status_pkt, u_char *secret, int secret_len, u_char *new_secret, int new_secret_len, unsigned char *private) argument
631 chapms2_retry_password(unsigned char *response, char *our_name, unsigned char *status_pkt, u_char *secret, int secret_len, unsigned char *private) argument
880 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
908 ChapMS_NT(u_char *rchallenge, u_char *secret, int secret_len, u_char NTResponse[24]) argument
922 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, u_char *secret, int secret_len, u_char NTResponse[24]) argument
942 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument
963 GenerateAuthenticatorResponse(u_char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
1042 Set_Start_Key(u_char *rchallenge, u_char *secret, int secret_len) argument
1060 SetMasterKeys(u_char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
1159 ChapMS(u_char *rchallenge, u_char *secret, int secret_len, MS_ChapResponse *response) argument
1196 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, u_char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dchap-new.c564 int secret_len; local
567 if (!get_secret(0, name, ourname, secret, &secret_len, 1)) {
572 ok = digest->verify_response(id, (char*)name, secret, secret_len, challenge,
587 int secret_len; local
613 if (!get_secret(0, (u_char*)cs->name, rname, secret, &secret_len, 0)) {
614 secret_len = 0; /* assume null secret if can't find one */
625 secret, secret_len, cs->priv);
626 memset(secret, 0, secret_len);
653 int secret_len; local
694 if (!get_secret(0, (u_char*)cs->name, rname, secret, &secret_len,
[all...]
H A Dchap.c461 int secret_len; local
501 secret, &secret_len, 0)) {
502 secret_len = 0; /* assume null secret if can't find one */
519 MD5Update(&mdContext, secret, secret_len);
528 ChapMS(cstate, rchallenge, secret, secret_len,
535 cstate->resp_name, secret, secret_len,
562 int secret_len, old_state; local
631 cstate->chal_name, secret, &secret_len, 1)) {
643 MD5Update(&mdContext, secret, secret_len);
678 ChapMS(cstate, cstate->challenge, secret, secret_len,
[all...]
H A Dauth.c2142 get_secret(unit, client, server, secret, secret_len, am_server)
2147 int *secret_len;
2196 *secret_len = len;
/macosx-10.10/OpenSSH-189/openssh/
H A Dauth2-jpake.c277 u_int secret_len, salt_len; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
363 bzero(secret, secret_len);
H A Dsshconnect2.c1109 u_int secret_len; local
1130 &secret, &secret_len) != 0)
1138 if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL)
1140 bzero(secret, secret_len);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/
H A Dkc-40-seckey.c148 size_t secret_len = max_len; local
164 secret, secret_len,
173 secret_len--;
177 ok(decrypted_secret_len == secret_len, "correct length");
178 ok_status(memcmp(secret_ptr, decrypted_secret, secret_len), "verify secret");
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-40-seckey.c139 size_t secret_len = max_len; local
155 secret, secret_len,
164 secret_len--;
168 ok(decrypted_secret_len == secret_len, "correct length");
169 ok_status(memcmp(secret_ptr, decrypted_secret, secret_len), "verify secret");
/macosx-10.10/Security-57031.1.35/securityd/src/
H A Dkcdatabase.cpp64 unlock_keybag(KeychainDbCommon & dbCommon, const void * secret, int secret_len) argument
75 rc = service_client_kb_unlock(&context, secret, secret_len);
78 rc = service_client_kb_create(&context, secret, secret_len);
80 rc = service_client_kb_unlock(&context, secret, secret_len);
89 rc = service_client_kb_change_secret(&context, encKey.data(), (int)encKey.length(), secret, secret_len);
94 if ((secret_len > 0) && service_client_kb_is_locked(&context, NULL, &no_pin) == 0) {
97 service_client_kb_change_secret(&context, NULL, 0, secret, secret_len);
114 change_secret_on_keybag(KeychainDbCommon & dbCommon, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument
122 if (service_client_kb_change_secret(&context, secret, secret_len, new_secret, new_secret_len) == KB_BagNotLoaded) {
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/plugins/
H A Dscram.c1566 size_t secret_len; local
1653 secret_len = strlen(SCRAM_SASL_MECH ":$:") +
1659 sec = sparams->utils->malloc(sizeof(sasl_secret_t) + secret_len);

Completed in 224 milliseconds