/macosx-10.10/files-662.1.1/private/etc/ |
H A D | ttys.embedded | 6 console "/usr/libexec/getty std.57600" vt100 off secure 11 # terminal (enabling logons over serial). If marked secure, the serial 16 tty.serial "/usr/libexec/getty serial.57600" vt100 off secure 24 tty[00-07] "/usr/libexec/getty std.9600" unknown off secure 27 ttyp[0x0-0xf] none network slot=36 secure 28 ttyq[0x0-0xf] none network secure 29 ttyr[0x0-0xf] none network secure 30 ttys[0x0-0xf] none network secure 31 ttyt[0x0-0xf] none network secure 32 ttyu[0x0-0xf] none network secure [all...] |
H A D | ttys | 6 #console "/usr/libexec/getty std.57600" vt100 on secure 7 console "/System/Library/CoreServices/loginwindow.app/Contents/MacOS/loginwindow" vt100 on secure onoption="/usr/libexec/getty std.9600" 12 # terminal (enabling logons over serial). If marked secure, the serial 17 tty.serial "/usr/libexec/getty serial.57600" vt100 off secure 25 tty[00-07] "/usr/libexec/getty std.9600" unknown off secure
|
/macosx-10.10/WebCore-7600.1.25/platform/ |
H A D | Cookie.h | 41 const String& path, double expires, bool httpOnly, bool secure, 49 , secure(secure) 60 bool secure; member in struct:WebCore::Cookie 67 return StringHash::hash(key.name) + StringHash::hash(key.domain) + StringHash::hash(key.path) + key.secure; 72 return a.name == b.name && a.domain == b.domain && a.path == b.path && a.secure == b.secure; 40 Cookie(const String& name, const String& value, const String& domain, const String& path, double expires, bool httpOnly, bool secure, bool session) argument
|
/macosx-10.10/ruby-106/ruby/lib/cgi/ |
H A D | cookie.rb | 19 # 'secure' => true # optional 29 # secure = cookie1.secure 36 # cookie1.secure = true 48 # variable, and #secure is false. 60 # secure:: whether this cookie is a secure cookie or not (default to 72 @secure = false 92 @secure = options["secure"] [all...] |
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/transfer/include/ |
H A D | secure.inc | 3 One way to secure connections made by objects of this package is to 13 # Create a connector with secure socket setup,
|
/macosx-10.10/apr-32/apr-util/apr-util/ldap/ |
H A D | apr_ldap_init.c | 141 * secure: 151 int secure, 161 * Using the secure argument should aways be possible. But as LDAP SDKs 166 *ldap = ldapssl_init(hostname, portno, secure == APR_LDAP_SSL); 178 if (secure == APR_LDAP_SSL) 182 return apr_ldap_set_option(pool, *ldap, APR_LDAP_OPT_TLS, &secure, result_err); 147 apr_ldap_init(apr_pool_t *pool, LDAP **ldap, const char *hostname, int portno, int secure, apr_ldap_err_t **result_err) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | verify_user.c | 42 krb5_boolean secure, 51 krb5_verify_init_creds_opt_set_ap_req_nofail(&vopt, secure); 81 krb5_boolean secure; member in struct:krb5_verify_opt 91 * If `secure', also verify against local service key for `service'. 100 opt->secure = TRUE; 143 krb5_verify_opt_set_secure(krb5_verify_opt *opt, krb5_boolean secure) argument 145 opt->secure = secure; 207 vopt ? vopt->secure : TRUE, 254 krb5_boolean secure, 37 verify_common(krb5_context context, krb5_principal principal, krb5_principal server_principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds *cred) argument 250 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 274 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/autosign/ |
H A D | clean.sh | 31 rm -f ns2/private.secure.example.db ns2/bar.db 42 rm -f ns3/secure.example.db 43 rm -f ns3/secure.nsec3.example.db 44 rm -f ns3/secure.optout.example.db 45 rm -f ns3/secure-to-insecure.example.db 49 rm -f ns3/secure-to-insecure2.example.db
|
/macosx-10.10/remote_cmds-47/ypserv.tproj/ |
H A D | ypserv_proc.c | 195 int secure = ypdb_secure(argp->domain,argp->map); local 200 "match_2: caller=[%s].%d, auth_ok=%s, secure=%s, domain=%s, map=%s, key=%.*s", 202 TORF(ok), TORF(secure), 211 if (secure && (ntohs(caller->sin_port) >= IPPORT_RESERVED)) { 232 int secure = ypdb_secure(argp->domain,argp->map); local 236 YPLOG( "first_2: caller=[%s].%d, auth_ok=%s, secure=%s, domain=%s, map=%s", 238 TORF(ok), TORF(secure), 247 if (secure && (ntohs(caller->sin_port) >= IPPORT_RESERVED)) { 268 int secure = ypdb_secure(argp->domain,argp->map); local 273 "next_2: caller=[%s].%d, auth_ok=%s, secure 393 int secure = ypdb_secure(argp->domain,argp->map); local 445 int secure = ypdb_secure(argp->domain,argp->map); local 496 int secure = ypdb_secure(argp->domain,argp->map); local 712 int secure; local 767 int secure; local 819 int secure; local 876 int secure; local 926 int secure; local 974 int secure; local 1022 int secure; local [all...] |
/macosx-10.10/ruby-106/ruby/lib/webrick/ |
H A D | cookie.rb | 46 # Is this a secure cookie? 48 attr_accessor :secure 70 @domain = @path = @secure = @comment = @max_age = 102 ret << "; " << "Secure" if @secure 156 when "secure" then cookie.secure = true
|
/macosx-10.10/srm-7/srm/ |
H A D | srm.spec | 15 Summary: srm (secure rm) is a command-line compatible rm(1) which destroys file contents before unlinking. 18 This is srm, a secure replacement for rm(1). Unlike the standard rm,
|
/macosx-10.10/tcl-105/tcl_ext/xotcl/xotcl/apps/comm/ |
H A D | secure-webclient.xotcl | 2 # $Id: secure-webclient.xotcl,v 1.2 2006/02/18 22:17:32 neumann Exp $ 8 A sample secure web client that queries an secure web-server. 31 puts "\nTrying to get a secure page ..... <$https_server>" 35 puts -nonewline "\nTrying to load image logo-100.jpg ... (not secure)" 44 puts -nonewline "\nTrying to load image logo-100.jpg secure ... "
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslViewer/ |
H A D | pingSslSites | 33 secure.authorize.net)
|
/macosx-10.10/Security-57031.1.35/sslViewer/ |
H A D | pingSslSites | 33 secure.authorize.net)
|
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/Views/ |
H A D | CookieStorageContentView.js | 82 var columns = {name: {}, value: {}, domain: {}, path: {}, expires: {}, size: {}, http: {}, secure: {}}; 114 columns.secure.title = WebInspector.UIString("Secure"); 115 columns.secure.aligned = "centered"; 116 columns.secure.sortable = true; 117 columns.secure.width = "7%"; 139 "secure": cookie.secure ? checkmark : "", 219 case "secure": comparator = localeCompare.bind(this, "secure"); break; 234 var cookieURL = (cookie.secure [all...] |
/macosx-10.10/adv_cmds-158/fingerd/ |
H A D | fingerd.c | 75 int p[2], logging, pflag, secure; local 81 logging = pflag = secure = 0; 94 secure = 1; 151 if (secure && ap == &av[3]) { 157 if (secure && strchr(*ap, '@')) {
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dnssec/ |
H A D | clean.sh | 22 rm -f ns1/root.db ns2/example.db ns3/secure.example.db 26 rm -f ns2/private.secure.example.db 42 rm -f ns3/secure.nsec3.example.db 43 rm -f ns3/secure.optout.example.db 52 rm -f ns3/secure.below-cname.example.db
|
/macosx-10.10/apr-32/apr-util/apr-util/include/ |
H A D | apr_ldap_init.h | 119 * secure: 126 * per connection client certificates are present, otherwise set secure 136 * @param secure The security mode to set 143 int secure,
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/autosign/ns2/ |
H A D | keygen.sh | 27 for subdomain in secure nsec3 optout rsasha256 rsasha512 nsec3-to-nsec oldsigs 42 # Create keys for a private secure zone. 43 zone=private.secure.example
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslScripts/ |
H A D | authDoncio | 20 set TEST_PATH=/secure/DoD_soft_cert
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dnssec/ns2/ |
H A D | sign.sh | 33 for subdomain in secure bogus dynamic keyless nsec3 optout nsec3-unknown \ 35 auto-nsec auto-nsec3 secure.below-cname ttlpatch expired 94 # Sign the privately secure file 96 privzone=private.secure.example. 97 privinfile=private.secure.example.db.in 98 privzonefile=private.secure.example.db 106 # Sign the DLV secure zone. 119 # Sign the badparam secure file 134 # Sign the single-nsec3 secure zone with optout
|
/macosx-10.10/emacs-93/emacs/lisp/url/ |
H A D | url-cookie.el | 45 (defsubst url-cookie-secure (cookie) (aref cookie 6)) 52 (defsubst url-cookie-set-secure (cookie val) (aset cookie 6 val)) 63 :secure ??? 72 (url-cookie-set-secure retval (url-cookie-retrieve-arg :secure args)) 89 (defvar url-cookie-secure-storage nil "Where secure cookies are stored.") 121 (defun url-cookie-clean-up (&optional secure) 123 (var (if secure 'url-cookie-secure [all...] |
/macosx-10.10/apache-793/httpd/include/ |
H A D | util_ldap.h | 123 int secure; /* SSL/TLS mode of the connection */ member in struct:util_ldap_connection_t 162 int secure; member in struct:util_ldap_state_t 233 * @param secure use SSL on the connection 244 int secure));
|
/macosx-10.10/removefile-35/ |
H A D | removefile_tree_walker.c | 49 int secure = state->unlink_flags & (REMOVEFILE_SECURE_7_PASS | REMOVEFILE_SECURE_35_PASS | REMOVEFILE_SECURE_1_PASS | REMOVEFILE_SECURE_3_PASS | REMOVEFILE_SECURE_1_PASS_ZERO); local 74 if (secure) { 95 if (secure) {
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dnssec/ns3/ |
H A D | sign.sh | 25 zone=secure.example. 26 infile=secure.example.db.in 27 zonefile=secure.example.db 76 zone=secure.nsec3.example. 77 infile=secure.nsec3.example.db.in 78 zonefile=secure.nsec3.example.db 128 zone=secure.optout.example. 129 infile=secure.optout.example.db.in 130 zonefile=secure.optout.example.db 322 zone=secure [all...] |