/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 106 char *secret, /* Private key */ 160 /* Set leading zeros if necessary and store in secret */ 161 (void) adjust(secret, xkey, keylen); 102 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, char *public, char *secret, char *pass ) argument
|
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 106 /* we store the following secret to check plaintext passwords: 108 * <salt> \0 <secret> 110 * where <secret> = MD5(<salt>, "sasldb", <pass>) 115 sasl_secret_t **secret) 119 sasl_secret_t **secret) 126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + 129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + 132 if (*secret == NULL) { 140 memcpy((*secret)->data, salt, 16); 141 (*secret) 113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument [all...] |
H A D | saslint.h | 191 sasl_secret_t *secret; member in struct:sasl_conn
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 109 * public and secret are buffers of size HEXKEYBYTES + 1. 112 __gen_dhkeys(public, secret, pass) 114 char *secret; 150 (void) adjust(secret, xkey); 271 MINT *secret; local 276 secret = mp_xtom(xsecret); 278 mp_pow(public, secret, MODULUS_192_0, common);
|
H A D | xcrypt.c | 75 * Encrypt a secret key given passwd 76 * The secret key is passed and returned in hex notation. 80 xencrypt(secret, passwd) 81 char *secret; 91 len = (int)strlen(secret) / 2; 95 (void) hex2bin(len, secret, buf); 104 (void) bin2hex(len, (unsigned char *) buf, secret); 116 * Decrypt secret key using passwd 117 * The secret key is passed and returned in hex notation. 121 xdecrypt(secret, passw 254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
/osnet-11/usr/src/common/crypto/ecc/ |
H A D | ec.c | 540 ** curve point in derived secret. If successful, derivedSecret->data 542 ** derived secret, and derivedSecret->len is the size of the secret 544 ** buffer containing the derived secret. 597 /* Allocate memory for the derived secret and copy 1091 EC_FreeDerivedKey(SECItem *secret, boolean_t freeit) argument 1093 SECITEM_FreeItem(secret, freeit);
|
/osnet-11/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 307 gettext("no secret in database")); 310 "no secret in database"); 321 gettext("empty secret")); 324 "empty secret"); 341 /* Do precalculation on plaintext secret */ 346 /* We have a precomputed secret */ 352 "Have neither type of secret"); 355 "Have neither type of secret"); 555 char secret[65]; local 563 memcpy(secret, se [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | rsa.c | 90 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 118 /* Decrypt using the secret key. */ 119 secret (decr_plaintext, ciphertext, sk); 128 /* Use the RSA secret function to create a signature of the plaintext. */ 129 secret (signature, plaintext, sk); 236 /* select two (very secret) primes */ 281 /* calculate the secret key d = e^1 mod phi */ 530 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */ 575 * Test wether the secret key is valid. 667 log_info ( "RSA secret ke 692 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function [all...] |
H A D | primegen.c | 33 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel, 290 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret. 754 gen_prime (unsigned int nbits, int secret, int randomlevel, 773 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits ); 786 generating a secret prime we are most probably doing that 790 if (secret) 824 if (!mpi_test_bit( ptest, nbits-1-secret )) 752 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 73 static uchar_t TLS_MASTER_SECRET_LABEL[] = {"master secret"}; 88 static void P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, 91 static void P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, 98 static void soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, 104 * Called for derivation of the master secret from the pre-master secret, 109 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument 122 SHA1Update(&sha1_ctx, secret, secretlen); 128 MD5Update(&md5_ctx, secret, secretlen); 137 * {secret, labe 144 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen) argument 217 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 297 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 1060 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument [all...] |
/osnet-11/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 367 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 369 if(!utils || !secret || !(*secret)) return; 372 utils->erasebuffer((char *)(*secret)->data, (*secret)->len); 374 utils->erasebuffer((*secret)->data, (*secret)->len); 376 utils->free(*secret); 377 *secret = NULL;
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | primegen.c | 34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel, 291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret. 755 gen_prime (unsigned int nbits, int secret, int randomlevel, 774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits ); 787 generating a secret prime we are most probably doing that 791 if (secret) 825 if (!mpi_test_bit( ptest, nbits-1-secret )) 753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
|
H A D | rsa.c | 91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 119 /* Decrypt using the secret key. */ 120 secret (decr_plaintext, ciphertext, sk); 129 /* Use the RSA secret function to create a signature of the plaintext. */ 130 secret (signature, plaintext, sk); 237 /* select two (very secret) primes */ 282 /* calculate the secret key d = e^1 mod phi */ 531 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */ 576 * Test wether the secret key is valid. 668 log_info ( "RSA secret ke 693 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function [all...] |
H A D | ac.c | 114 gcry_ac_key_t secret; 1664 key_pair_new->secret = key_secret; 1702 key = key_pair->secret; 1747 gcry_ac_key_destroy (key_pair->secret); 1942 DATA_ENCRYPTED with the secret key KEY under the control of the 2019 /* Signs the data contained in DATA with the secret key KEY and stores 2094 in DATA with the secret key belonging to the public key KEY. */ 2975 with the secret key KEY_SECRET according to the Encryption Scheme 3091 secret key KEY according to the Signature Scheme SCHEME_ID. Handle 3185 is of size M_N, with the secret ke 113 gcry_ac_key_t secret; member in struct:gcry_ac_key_pair [all...] |