/macosx-10.10/Security-57031.1.35/securityd/securityd_service/securityd_service/ |
H A D | securityd_service_client.h | 30 int service_client_kb_create(service_context_t *context, const void * secret, int secret_len); 32 int service_client_kb_unlock(service_context_t *context, const void * secret, int secret_len); 34 int service_client_kb_change_secret(service_context_t *context, const void * secret, int secret_len, const void * new_secret, int new_secret_len); 36 int service_client_kb_reset(service_context_t *context, const void * secret, int secret_len);
|
H A D | securityd_service_client.c | 73 _service_client_send_secret(service_context_t *context, uint64_t request, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument 83 xpc_dictionary_set_data(message, SERVICE_XPC_SECRET, secret, secret_len); 98 service_client_kb_create(service_context_t *context, const void * secret, int secret_len) argument 100 return _service_client_send_secret(context, SERVICE_KB_CREATE, secret, secret_len, NULL, 0); 110 service_client_kb_unlock(service_context_t *context, const void * secret, int secret_len) argument 112 return _service_client_send_secret(context, SERVICE_KB_UNLOCK, secret, secret_len, NULL, 0); 122 service_client_kb_change_secret(service_context_t *context, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument 124 return _service_client_send_secret(context, SERVICE_KB_CHANGE_SECRET, secret, secret_len, new_secret, new_secret_len); 128 service_client_kb_reset(service_context_t *context, const void * secret, int secret_len) argument 130 return _service_client_send_secret(context, SERVICE_KB_RESET, secret, secret_len, NUL [all...] |
H A D | main.c | 384 service_kb_create(service_context_t * context, const void * secret, int secret_len) argument 400 require_noerr(rc = aks_create_bag(secret, secret_len, kAppleKeyStoreDeviceBag, &session_handle), done); 408 aks_unlock_bag(session_handle, secret, secret_len); 460 service_kb_unlock(service_context_t * context, const void * secret, int secret_len) argument 466 rc = aks_unlock_bag(session_handle, secret, secret_len); 486 service_kb_change_secret(service_context_t * context, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument 498 require_noerr(rc = aks_change_secret(session_handle, secret, secret_len, new_secret, new_secret_len, NULL, NULL), done); 518 service_kb_reset(service_context_t * context, const void * secret, int secret_len) argument 535 require_noerr(rc = aks_create_bag(secret, secret_len, kAppleKeyStoreDeviceBag, &session_handle), done); 543 aks_unlock_bag(session_handle, secret, secret_len); 888 size_t secret_len = 0, new_secret_len = 0, data_len = 0; local [all...] |
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | chap-md5.c | 83 unsigned char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 114 unsigned char *challenge, u_char *secret, int secret_len, 123 MD5_Update(&ctx, secret, secret_len); 82 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 113 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.h | 132 unsigned char *secret, int secret_len, 136 unsigned char *challenge, u_char *secret, int secret_len, 142 unsigned char *status_pkt, u_char *secret, int secret_len, 146 unsigned char *status_pkt, u_char *secret, int secret_len,
|
H A D | chap_ms.c | 222 unsigned char *secret, int secret_len, 247 ChapMS(challenge, secret, secret_len, &md); 272 unsigned char *secret, int secret_len, 290 secret, secret_len, &md, 351 unsigned char *challenge, u_char *secret, int secret_len, 356 ChapMS(challenge, secret, secret_len, (MS_ChapResponse *) response); 361 unsigned char *challenge, u_char *secret, int secret_len, 391 secret, secret_len, 576 u_char *secret, int secret_len, 596 secret, secret_len, 221 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 271 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 350 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument 360 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, u_char *secret, int secret_len, unsigned char *private) argument 574 chapms2_change_password(unsigned char *response, char *our_name, unsigned char *status_pkt, u_char *secret, int secret_len, u_char *new_secret, int new_secret_len, unsigned char *private) argument 631 chapms2_retry_password(unsigned char *response, char *our_name, unsigned char *status_pkt, u_char *secret, int secret_len, unsigned char *private) argument 880 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 908 ChapMS_NT(u_char *rchallenge, u_char *secret, int secret_len, u_char NTResponse[24]) argument 922 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, u_char *secret, int secret_len, u_char NTResponse[24]) argument 942 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, MS_ChapResponse *response) argument 963 GenerateAuthenticatorResponse(u_char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 1042 Set_Start_Key(u_char *rchallenge, u_char *secret, int secret_len) argument 1060 SetMasterKeys(u_char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 1159 ChapMS(u_char *rchallenge, u_char *secret, int secret_len, MS_ChapResponse *response) argument 1196 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, u_char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | chap-new.c | 564 int secret_len; local 567 if (!get_secret(0, name, ourname, secret, &secret_len, 1)) { 572 ok = digest->verify_response(id, (char*)name, secret, secret_len, challenge, 587 int secret_len; local 613 if (!get_secret(0, (u_char*)cs->name, rname, secret, &secret_len, 0)) { 614 secret_len = 0; /* assume null secret if can't find one */ 625 secret, secret_len, cs->priv); 626 memset(secret, 0, secret_len); 653 int secret_len; local 694 if (!get_secret(0, (u_char*)cs->name, rname, secret, &secret_len, [all...] |
H A D | chap.c | 461 int secret_len; local 501 secret, &secret_len, 0)) { 502 secret_len = 0; /* assume null secret if can't find one */ 519 MD5Update(&mdContext, secret, secret_len); 528 ChapMS(cstate, rchallenge, secret, secret_len, 535 cstate->resp_name, secret, secret_len, 562 int secret_len, old_state; local 631 cstate->chal_name, secret, &secret_len, 1)) { 643 MD5Update(&mdContext, secret, secret_len); 678 ChapMS(cstate, cstate->challenge, secret, secret_len, [all...] |
H A D | auth.c | 2142 get_secret(unit, client, server, secret, secret_len, am_server) 2147 int *secret_len; 2196 *secret_len = len;
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth2-jpake.c | 277 u_int secret_len, salt_len; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 363 bzero(secret, secret_len);
|
H A D | sshconnect2.c | 1109 u_int secret_len; local 1130 &secret, &secret_len) != 0) 1138 if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL) 1140 bzero(secret, secret_len);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-40-seckey.c | 148 size_t secret_len = max_len; local 164 secret, secret_len, 173 secret_len--; 177 ok(decrypted_secret_len == secret_len, "correct length"); 178 ok_status(memcmp(secret_ptr, decrypted_secret, secret_len), "verify secret");
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey.c | 139 size_t secret_len = max_len; local 155 secret, secret_len, 164 secret_len--; 168 ok(decrypted_secret_len == secret_len, "correct length"); 169 ok_status(memcmp(secret_ptr, decrypted_secret, secret_len), "verify secret");
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | kcdatabase.cpp | 64 unlock_keybag(KeychainDbCommon & dbCommon, const void * secret, int secret_len) argument 75 rc = service_client_kb_unlock(&context, secret, secret_len); 78 rc = service_client_kb_create(&context, secret, secret_len); 80 rc = service_client_kb_unlock(&context, secret, secret_len); 89 rc = service_client_kb_change_secret(&context, encKey.data(), (int)encKey.length(), secret, secret_len); 94 if ((secret_len > 0) && service_client_kb_is_locked(&context, NULL, &no_pin) == 0) { 97 service_client_kb_change_secret(&context, NULL, 0, secret, secret_len); 114 change_secret_on_keybag(KeychainDbCommon & dbCommon, const void * secret, int secret_len, const void * new_secret, int new_secret_len) argument 122 if (service_client_kb_change_secret(&context, secret, secret_len, new_secret, new_secret_len) == KB_BagNotLoaded) {
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | scram.c | 1566 size_t secret_len; local 1653 secret_len = strlen(SCRAM_SASL_MECH ":$:") + 1659 sec = sparams->utils->malloc(sizeof(sasl_secret_t) + secret_len);
|