/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keylogout.c | 43 * unset the secret key on local machine 59 static char secret[HEXKEYBYTES + 1]; local 74 fprintf(stderr, "Could not unset your secret key.\n"); 78 if (key_setsecret(secret) < 0) { 80 fprintf(stderr, "Could not unset your secret key.\n");
|
H A D | keyserv_cache.h | 62 keybuf3 *secret; member in struct:cachekey3_list 80 keybuf3 *secret);
|
H A D | keylogin.c | 42 * Set secret key on local machine 112 /* write unencrypted secret key into root key file */ 114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument 176 fprintf(rootfile, "%s\n", secret); 192 fprintf(rootfile, "%s %d\n", secret, algtype); 202 fprintf(rootfile, "%s\n", secret); 206 fprintf(rootfile, "%s %d\n", secret, algtype); 214 fprintf(stderr, "Wrote secret key into %s\n", ROOTKEY_FILE); 229 char secret[HEXKEYBYTES+1]; local 232 if (getsecretkey(fullname, secret, pas 291 static char secret[HEXKEYBYTES + 1]; local 326 char secret[4096]; local [all...] |
H A D | newkey.c | 88 char secret[HEXKEYBYTES + 1]; local 211 (void) __gen_dhkeys(public, secret, short_pass); 213 (void) memcpy(crypt1, secret, HEXKEYBYTES); 214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 246 setpublicmap(name, public, secret, database, pw) 250 char *secret; 258 (void) sprintf(pkent, "%s:%s", public, secret); 292 return (ldap_update("dh192-0", name, public, secret, pw));
|
H A D | chkey.c | 85 char **slist = NULL; /* List of secret key(s) */ 86 char **clist = NULL; /* List of encrypted secret key(s) */ 155 /* Encrypt secret key(s) with login_pw */ 193 fprintf(stderr, "%s: Could not encrypt any secret keys.\n", 200 /* Initialize the array of public, secret, and encrypted secret keys */ 289 /* Generate a new set of public/secret key pair(s) */ 297 char *public, *secret; local 310 if (!(secret = malloc(hexkeylen))) { 316 if (!(__gen_dhkeys_g(public, secret, CURMEC 333 char *public, *secret; local 495 char *secret; local 567 char *secret = NULL; local 616 char *secret = slist[0]; local 733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument [all...] |
H A D | chkey_common.c | 374 keylogin(char *netname, char *secret) argument 379 memcpy(netst.st_priv_key, secret, HEXKEYBYTES); 395 "Could not set %s's secret key\n", netname); 878 /* Entry exists, modify attributes for public and secret keys */
|
H A D | keyserv_cache.c | 58 struct dhkey secret; member in struct:skck 70 * 8 * ( ( ( sizeof(struct skck) - 1 + secret.length ) - 1 ) / 8 + 1 ) 115 keybuf3 *secret); 858 keybuf3 *secret) 875 (sk = keybuf3_2_dhkey(secret)) == 0) { 898 memcpy(&(skck->secret), sk, DHKEYSIZE(sk)); 962 cl->secret = MOVE_ADDR(cl->public->keybuf3_val, 964 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3)); 966 MOVE_ADDR(cl->secret 852 cache_insert_ch( struct cachekey_header *ch, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument 1203 cache_insert( keylen_t keylen, algtype_t algtype, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument [all...] |
H A D | keyserv.c | 42 * keyserv(1M) performs multiple functions: it stores secret keys per uid; it 543 * Try to get root's secret key, by prompting if terminal is a tty, else trying 554 char secret[HEXKEYBYTES + 1]; local 569 * Decrypt yellow pages publickey entry to get secret key 573 if (!getsecretkey(name, secret, passwd)) { 575 "Can't find %s's secret key\n", name); 578 if (secret[0] == 0) { 580 "Password does not decrypt secret key for %s\n", name); 588 retval = storeotherrootkeys(fp, name, passwd, secret);
|
H A D | setkey.c | 41 * Store secret keys. Compute common keys, 81 keybuf secret; member in struct:cachekey_list 450 cachehit3(keybuf3 *public, keybuf3 *secret, struct cachekey3_list *cp) argument 453 cmpkeybuf3(secret, cp->secret)); 579 keybuf3 *secret; local 591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { 598 secret->keybuf3_val, secret->keybuf3_len, 601 ("Can't find %s's secret ke 926 keybuf3 *secret, *public; local 1286 MINT *secret; local 1365 map_ps2cache(keybuf3 *public, keybuf3 *secret, struct psdata *pdp) argument 1381 getdeskey3( keylen_t keylen, algtype_t algtype, int desarylen, keybuf3 *public, keybuf3 *secret, uid_t uid ) argument 1649 MINT *secret; local [all...] |
/illumos-gate/usr/src/uts/common/inet/sctp/ |
H A D | sctp_heartbeat.c | 113 * a 64 bit secret, followed by the v6 (possible a v4mapped) address this 167 * The per peer address secret is used to make sure that the heartbeat 268 * put the timestamp, a secret and the peer address the heartbeat is 276 uint64_t secret; local 287 sizeof (sent) + sizeof (secret) + sizeof (addr))) { 311 /* Grab the secret to make sure that this heartbeat is valid */ 312 bcopy(++sentp, &secret, sizeof (secret)); 322 if (secret != fp->sf_hb_secret) { 324 ("sctp_process_heartbeat: invalid secret i [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 106 char *secret, /* Private key */ 160 /* Set leading zeros if necessary and store in secret */ 161 (void) adjust(secret, xkey, keylen); 102 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, char *public, char *secret, char *pass ) argument
|
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | main.c | 182 UINT32 secret_len, BYTE *secret) 188 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret); 190 print_error(ret, gettext("Set policy secret")); 209 UINT32 secret_len, BYTE *secret) 220 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret)); 181 set_policy_options(TSS_HPOLICY hPolicy, TSS_FLAG mode, char *prompt, UINT32 secret_len, BYTE *secret) argument 208 set_object_policy(TSS_HOBJECT handle, TSS_FLAG mode, char *prompt, UINT32 secret_len, BYTE *secret) argument
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 106 /* we store the following secret to check plaintext passwords: 108 * <salt> \0 <secret> 110 * where <secret> = MD5(<salt>, "sasldb", <pass>) 115 sasl_secret_t **secret) 119 sasl_secret_t **secret) 126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + 129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + 132 if (*secret == NULL) { 140 memcpy((*secret)->data, salt, 16); 141 (*secret) 113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument [all...] |
H A D | saslint.h | 190 sasl_secret_t *secret; member in struct:sasl_conn
|
/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 109 * public and secret are buffers of size HEXKEYBYTES + 1. 112 __gen_dhkeys(public, secret, pass) 114 char *secret; 150 (void) adjust(secret, xkey); 271 MINT *secret; local 276 secret = mp_xtom(xsecret); 278 mp_pow(public, secret, MODULUS_192_0, common);
|
H A D | xcrypt.c | 75 * Encrypt a secret key given passwd 76 * The secret key is passed and returned in hex notation. 80 xencrypt(secret, passwd) 81 char *secret; 90 len = (int)strlen(secret) / 2; 94 (void) hex2bin(len, secret, buf); 103 (void) bin2hex(len, (unsigned char *) buf, secret); 109 * Decrypt secret key using passwd 110 * The secret key is passed and returned in hex notation. 114 xdecrypt(secret, passw 240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | chap.c | 440 char secret[MAXSECRETLEN]; local 510 /* get secret for authenticating ourselves with the specified host */ 512 secret, &secret_len, 0)) { 513 secret_len = 0; /* assume null secret if can't find one */ 514 warn("No CHAP secret found for authenticating us (%q) to %q", 531 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len); 545 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 551 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len); 560 BZERO(secret, sizeof(secret)); 580 char secret[MAXSECRETLEN]; local [all...] |
H A D | chap_ms.c | 286 ChapMS_NT(rchallenge, secret, secret_len, response) 288 char *secret; 303 /* Initialize the Unicode version of the secret (== password). */ 307 unicodePassword[i * 2] = (u_char)secret[i]; 321 ChapMS_LANMan(rchallenge, secret, secret_len, response) 323 char *secret; 335 islower(secret[i]) ? toupper(secret[i]) : secret[i]); 343 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_le 631 rhostname, secret, secret_len); local [all...] |
H A D | auth.c | 595 error("No secret found for PAP login"); 1003 "but I couldn't find any suitable secret (password) for it to use to do so."); 1080 char secret[MAXWORDLEN]; local 1111 * Open the file of pap secrets and scan for a suitable secret 1123 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) { 1124 warn("no PAP secret found for %s", user); 1128 } else if (secret[0] != '\0') { 1130 if ((!cryptpap && strcmp(passwd, secret) == 0) 1131 || strcmp(crypt(passwd, secret), secret) 1442 char secret[MAXWORDLEN]; local 1483 char secret[MAXWORDLEN]; local [all...] |
/illumos-gate/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 309 gettext("no secret in database")); 312 "no secret in database"); 323 gettext("empty secret")); 326 "empty secret"); 343 /* Do precalculation on plaintext secret */ 348 /* We have a precomputed secret */ 354 "Have neither type of secret"); 357 "Have neither type of secret"); 557 char secret[65]; local 565 memcpy(secret, se [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 73 static uchar_t TLS_MASTER_SECRET_LABEL[] = {"master secret"}; 101 * Called for derivation of the master secret from the pre-master secret, 106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument 119 SHA1Update(&sha1_ctx, secret, secretlen); 125 MD5Update(&md5_ctx, secret, secretlen); 134 * {secret, label, seed} into any arbitrary length string of pseudo 136 * Here, it is called for the derivation of the master secret from the 137 * pre-master secret, and for the derivation of the key_block in a TLS 141 soft_tls_prf(uchar_t *secret, uint_ argument 214 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 294 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 1054 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument [all...] |
/illumos-gate/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 368 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 370 if(!utils || !secret || !(*secret)) return; 373 utils->erasebuffer((char *)(*secret)->data, (*secret)->len); 375 utils->erasebuffer((*secret)->data, (*secret)->len); 377 utils->free(*secret); 378 *secret = NULL;
|
/illumos-gate/usr/src/uts/common/inet/kssl/ |
H A D | ksslrec.c | 1087 * A(i) = HMAC_hash(secret, seed + A(i-1)); 1091 * A(1) = HMAC_hash(secret, label + seed) 1141 uchar_t *secret, size_t secret_len, 1148 * PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR 1150 * S1 = 1st half of secret. 1151 * S1 = 2nd half of secret. 1159 /* length of secret keys is ceil(length/2) */ 1172 S1.ck_data = secret; 1176 S2.ck_data = secret + slen; 1224 * Computing the master secret 1140 kssl_tls_PRF(ssl_t *ssl, uchar_t *secret, size_t secret_len, uchar_t *label, size_t label_len, uchar_t *seed, size_t seed_len, uchar_t *prfresult, size_t prfresult_len) argument 1313 kssl_ssl3_key_material_derive_step( ssl_t *ssl, uchar_t *secret, size_t secretlen, int step, uchar_t *dst, int sr_first) argument [all...] |
/illumos-gate/usr/src/cmd/iscsiadm/ |
H A D | iscsiadm_main.c | 276 {"CHAP-secret", no_arg, 'C', NULL}, 282 {"radius-shared-secret", no_arg, 'P', NULL}, 1510 * Retrieve CHAP secret from input 1513 getSecret(char *secret, int *secretLen, int minSecretLen, int maxSecretLen) argument 1518 chapSecret = getpassphrase(gettext("Enter secret:")); 1522 gettext("Unable to get secret")); 1523 *secret = NULL; 1529 gettext("secret too long, maximum length is"), 1531 *secret = NULL; 1537 gettext("secret to [all...] |