Searched defs:secret (Results 1 - 24 of 24) sorted by relevance

/illumos-gate/usr/src/cmd/keyserv/
H A Dkeylogout.c43 * unset the secret key on local machine
59 static char secret[HEXKEYBYTES + 1]; local
74 fprintf(stderr, "Could not unset your secret key.\n");
78 if (key_setsecret(secret) < 0) {
80 fprintf(stderr, "Could not unset your secret key.\n");
H A Dkeyserv_cache.h62 keybuf3 *secret; member in struct:cachekey3_list
80 keybuf3 *secret);
H A Dkeylogin.c42 * Set secret key on local machine
112 /* write unencrypted secret key into root key file */
114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument
176 fprintf(rootfile, "%s\n", secret);
192 fprintf(rootfile, "%s %d\n", secret, algtype);
202 fprintf(rootfile, "%s\n", secret);
206 fprintf(rootfile, "%s %d\n", secret, algtype);
214 fprintf(stderr, "Wrote secret key into %s\n", ROOTKEY_FILE);
229 char secret[HEXKEYBYTES+1]; local
232 if (getsecretkey(fullname, secret, pas
291 static char secret[HEXKEYBYTES + 1]; local
326 char secret[4096]; local
[all...]
H A Dnewkey.c88 char secret[HEXKEYBYTES + 1]; local
211 (void) __gen_dhkeys(public, secret, short_pass);
213 (void) memcpy(crypt1, secret, HEXKEYBYTES);
214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE);
246 setpublicmap(name, public, secret, database, pw)
250 char *secret;
258 (void) sprintf(pkent, "%s:%s", public, secret);
292 return (ldap_update("dh192-0", name, public, secret, pw));
H A Dchkey.c85 char **slist = NULL; /* List of secret key(s) */
86 char **clist = NULL; /* List of encrypted secret key(s) */
155 /* Encrypt secret key(s) with login_pw */
193 fprintf(stderr, "%s: Could not encrypt any secret keys.\n",
200 /* Initialize the array of public, secret, and encrypted secret keys */
289 /* Generate a new set of public/secret key pair(s) */
297 char *public, *secret; local
310 if (!(secret = malloc(hexkeylen))) {
316 if (!(__gen_dhkeys_g(public, secret, CURMEC
333 char *public, *secret; local
495 char *secret; local
567 char *secret = NULL; local
616 char *secret = slist[0]; local
733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument
[all...]
H A Dchkey_common.c374 keylogin(char *netname, char *secret) argument
379 memcpy(netst.st_priv_key, secret, HEXKEYBYTES);
395 "Could not set %s's secret key\n", netname);
878 /* Entry exists, modify attributes for public and secret keys */
H A Dkeyserv_cache.c58 struct dhkey secret; member in struct:skck
70 * 8 * ( ( ( sizeof(struct skck) - 1 + secret.length ) - 1 ) / 8 + 1 )
115 keybuf3 *secret);
858 keybuf3 *secret)
875 (sk = keybuf3_2_dhkey(secret)) == 0) {
898 memcpy(&(skck->secret), sk, DHKEYSIZE(sk));
962 cl->secret = MOVE_ADDR(cl->public->keybuf3_val,
964 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3));
966 MOVE_ADDR(cl->secret
852 cache_insert_ch( struct cachekey_header *ch, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument
1203 cache_insert( keylen_t keylen, algtype_t algtype, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument
[all...]
H A Dkeyserv.c42 * keyserv(1M) performs multiple functions: it stores secret keys per uid; it
543 * Try to get root's secret key, by prompting if terminal is a tty, else trying
554 char secret[HEXKEYBYTES + 1]; local
569 * Decrypt yellow pages publickey entry to get secret key
573 if (!getsecretkey(name, secret, passwd)) {
575 "Can't find %s's secret key\n", name);
578 if (secret[0] == 0) {
580 "Password does not decrypt secret key for %s\n", name);
588 retval = storeotherrootkeys(fp, name, passwd, secret);
H A Dsetkey.c41 * Store secret keys. Compute common keys,
81 keybuf secret; member in struct:cachekey_list
450 cachehit3(keybuf3 *public, keybuf3 *secret, struct cachekey3_list *cp) argument
453 cmpkeybuf3(secret, cp->secret));
579 keybuf3 *secret; local
591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) {
598 secret->keybuf3_val, secret->keybuf3_len,
601 ("Can't find %s's secret ke
926 keybuf3 *secret, *public; local
1286 MINT *secret; local
1365 map_ps2cache(keybuf3 *public, keybuf3 *secret, struct psdata *pdp) argument
1381 getdeskey3( keylen_t keylen, algtype_t algtype, int desarylen, keybuf3 *public, keybuf3 *secret, uid_t uid ) argument
1649 MINT *secret; local
[all...]
/illumos-gate/usr/src/uts/common/inet/sctp/
H A Dsctp_heartbeat.c113 * a 64 bit secret, followed by the v6 (possible a v4mapped) address this
167 * The per peer address secret is used to make sure that the heartbeat
268 * put the timestamp, a secret and the peer address the heartbeat is
276 uint64_t secret; local
287 sizeof (sent) + sizeof (secret) + sizeof (addr))) {
311 /* Grab the secret to make sure that this heartbeat is valid */
312 bcopy(++sentp, &secret, sizeof (secret));
322 if (secret != fp->sf_hb_secret) {
324 ("sctp_process_heartbeat: invalid secret i
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Dgeneric_key.c106 char *secret, /* Private key */
160 /* Set leading zeros if necessary and store in secret */
161 (void) adjust(secret, xkey, keylen);
102 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, char *public, char *secret, char *pass ) argument
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/
H A Dmain.c182 UINT32 secret_len, BYTE *secret)
188 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret);
190 print_error(ret, gettext("Set policy secret"));
209 UINT32 secret_len, BYTE *secret)
220 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret));
181 set_policy_options(TSS_HPOLICY hPolicy, TSS_FLAG mode, char *prompt, UINT32 secret_len, BYTE *secret) argument
208 set_object_policy(TSS_HOBJECT handle, TSS_FLAG mode, char *prompt, UINT32 secret_len, BYTE *secret) argument
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dcheckpw.c106 /* we store the following secret to check plaintext passwords:
108 * <salt> \0 <secret>
110 * where <secret> = MD5(<salt>, "sasldb", <pass>)
115 sasl_secret_t **secret)
119 sasl_secret_t **secret)
126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) +
129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) +
132 if (*secret == NULL) {
140 memcpy((*secret)->data, salt, 16);
141 (*secret)
113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument
[all...]
H A Dsaslint.h190 sasl_secret_t *secret; member in struct:sasl_conn
/illumos-gate/usr/src/lib/libnsl/key/
H A Dgen_dhkeys.c109 * public and secret are buffers of size HEXKEYBYTES + 1.
112 __gen_dhkeys(public, secret, pass)
114 char *secret;
150 (void) adjust(secret, xkey);
271 MINT *secret; local
276 secret = mp_xtom(xsecret);
278 mp_pow(public, secret, MODULUS_192_0, common);
H A Dxcrypt.c75 * Encrypt a secret key given passwd
76 * The secret key is passed and returned in hex notation.
80 xencrypt(secret, passwd)
81 char *secret;
90 len = (int)strlen(secret) / 2;
94 (void) hex2bin(len, secret, buf);
103 (void) bin2hex(len, (unsigned char *) buf, secret);
109 * Decrypt secret key using passwd
110 * The secret key is passed and returned in hex notation.
114 xdecrypt(secret, passw
240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dchap.c440 char secret[MAXSECRETLEN]; local
510 /* get secret for authenticating ourselves with the specified host */
512 secret, &secret_len, 0)) {
513 secret_len = 0; /* assume null secret if can't find one */
514 warn("No CHAP secret found for authenticating us (%q) to %q",
531 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len);
545 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
551 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len);
560 BZERO(secret, sizeof(secret));
580 char secret[MAXSECRETLEN]; local
[all...]
H A Dchap_ms.c286 ChapMS_NT(rchallenge, secret, secret_len, response)
288 char *secret;
303 /* Initialize the Unicode version of the secret (== password). */
307 unicodePassword[i * 2] = (u_char)secret[i];
321 ChapMS_LANMan(rchallenge, secret, secret_len, response)
323 char *secret;
335 islower(secret[i]) ? toupper(secret[i]) : secret[i]);
343 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_le
631 rhostname, secret, secret_len); local
[all...]
H A Dauth.c595 error("No secret found for PAP login");
1003 "but I couldn't find any suitable secret (password) for it to use to do so.");
1080 char secret[MAXWORDLEN]; local
1111 * Open the file of pap secrets and scan for a suitable secret
1123 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) {
1124 warn("no PAP secret found for %s", user);
1128 } else if (secret[0] != '\0') {
1130 if ((!cryptpap && strcmp(passwd, secret) == 0)
1131 || strcmp(crypt(passwd, secret), secret)
1442 char secret[MAXWORDLEN]; local
1483 char secret[MAXWORDLEN]; local
[all...]
/illumos-gate/usr/src/lib/sasl_plugins/cram/
H A Dcram.c309 gettext("no secret in database"));
312 "no secret in database");
323 gettext("empty secret"));
326 "empty secret");
343 /* Do precalculation on plaintext secret */
348 /* We have a precomputed secret */
354 "Have neither type of secret");
357 "Have neither type of secret");
557 char secret[65]; local
565 memcpy(secret, se
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c73 static uchar_t TLS_MASTER_SECRET_LABEL[] = {"master secret"};
101 * Called for derivation of the master secret from the pre-master secret,
106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument
119 SHA1Update(&sha1_ctx, secret, secretlen);
125 MD5Update(&md5_ctx, secret, secretlen);
134 * {secret, label, seed} into any arbitrary length string of pseudo
136 * Here, it is called for the derivation of the master secret from the
137 * pre-master secret, and for the derivation of the key_block in a TLS
141 soft_tls_prf(uchar_t *secret, uint_ argument
214 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument
294 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument
1054 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument
[all...]
/illumos-gate/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c368 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument
370 if(!utils || !secret || !(*secret)) return;
373 utils->erasebuffer((char *)(*secret)->data, (*secret)->len);
375 utils->erasebuffer((*secret)->data, (*secret)->len);
377 utils->free(*secret);
378 *secret = NULL;
/illumos-gate/usr/src/uts/common/inet/kssl/
H A Dksslrec.c1087 * A(i) = HMAC_hash(secret, seed + A(i-1));
1091 * A(1) = HMAC_hash(secret, label + seed)
1141 uchar_t *secret, size_t secret_len,
1148 * PRF(secret, label, seed) = P_MD5(S1, label + seed) XOR
1150 * S1 = 1st half of secret.
1151 * S1 = 2nd half of secret.
1159 /* length of secret keys is ceil(length/2) */
1172 S1.ck_data = secret;
1176 S2.ck_data = secret + slen;
1224 * Computing the master secret
1140 kssl_tls_PRF(ssl_t *ssl, uchar_t *secret, size_t secret_len, uchar_t *label, size_t label_len, uchar_t *seed, size_t seed_len, uchar_t *prfresult, size_t prfresult_len) argument
1313 kssl_ssl3_key_material_derive_step( ssl_t *ssl, uchar_t *secret, size_t secretlen, int step, uchar_t *dst, int sr_first) argument
[all...]
/illumos-gate/usr/src/cmd/iscsiadm/
H A Discsiadm_main.c276 {"CHAP-secret", no_arg, 'C', NULL},
282 {"radius-shared-secret", no_arg, 'P', NULL},
1510 * Retrieve CHAP secret from input
1513 getSecret(char *secret, int *secretLen, int minSecretLen, int maxSecretLen) argument
1518 chapSecret = getpassphrase(gettext("Enter secret:"));
1522 gettext("Unable to get secret"));
1523 *secret = NULL;
1529 gettext("secret too long, maximum length is"),
1531 *secret = NULL;
1537 gettext("secret to
[all...]

Completed in 97 milliseconds