Searched defs:secret (Results 1 - 12 of 12) sorted by relevance

/vbox/src/VBox/Devices/PC/ipxe/src/util/
H A Dmucurses_test.c10 char secret[16]; local
15 get_iscsi_chap_secret(secret);
17 mvwprintw( stdscr, 3, 5, "password is \"%s\"", secret );
26 char *title = "Set new iSCSI CHAP secret",
27 *msg = "Configure the iSCSI access secret",
29 WINDOW *secret; local
31 secret = newwin( stdscr->height / 2,
36 wborder( secret, '|', '|', '-', '-', '+', '+', '+', '+' );
37 mvwprintw( secret, 1, 2, "%s", title );
38 mvwhline( secret,
[all...]
/vbox/src/VBox/Devices/Network/lwip/src/netif/ppp/
H A Dchap.c422 char secret[MAXSECRETLEN]; local
465 /* get secret for authenticating ourselves with the specified host */
467 secret, &secret_len, 0)) {
468 secret_len = 0; /* assume null secret if can't find one */
469 CHAPDEBUG((LOG_WARNING, "No CHAP secret found for authenticating us to %s\n", rhostname));
485 MD5Update(&mdContext, (u_char*)secret, secret_len);
494 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
503 BZERO(secret, sizeof(secret));
518 char secret[MAXSECRETLE local
[all...]
H A Dchpms.c125 char *secret,
142 char *secret,
152 CHAPDEBUG((LOG_INFO, "ChapMS: secret is '%.*s'\n", secret_len, secret));
157 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response);
160 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, &response);
343 char *secret,
353 /* Initialize the Unicode version of the secret (== password). */
357 unicodePassword[i * 2] = (u_char)secret[i];
378 char *secret,
138 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len ) argument
340 ChapMS_NT( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response ) argument
375 ChapMS_LANMan( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response ) argument
[all...]
H A Dauth.c297 AUTHDEBUG((LOG_ERR, "No secret found for PAP login\n"));
519 char secret[MAXWORDLEN];
562 BZERO(secret, sizeof(secret));
594 * get_secret - open the CHAP secret file and return the secret
602 char *secret,
622 BCOPY(ppp_settings.passwd, secret, len);
634 /* XXX Find secret. */
646 BCOPY(secbuf, secret, le
598 get_secret( int unit, char *client, char *server, char *secret, int *secret_len, int save_addrs ) argument
[all...]
/vbox/src/VBox/Devices/Network/lwip-new/src/netif/ppp/
H A Dchap.c428 char secret[MAXSECRETLEN]; local
472 /* get secret for authenticating ourselves with the specified host */
474 secret, &secret_len, 0)) {
475 secret_len = 0; /* assume null secret if can't find one */
476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n",
494 MD5Update(&mdContext, (u_char*)secret, secret_len);
503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
512 BZERO(secret, sizeof(secret));
528 char secret[MAXSECRETLE local
[all...]
H A Dchpms.c133 char *secret,
307 char *secret,
318 /* Initialize the Unicode version of the secret (== password). */
322 unicodePassword[i * 2] = (u_char)secret[i];
346 char *secret,
357 UcasePassword[i] = (u_char)toupper(secret[i]);
366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) argument
374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret));
379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_le
305 ChapMS_NT( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument
344 ChapMS_LANMan( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument
[all...]
H A Dauth.c507 AUTHDEBUG(LOG_ERR, ("No secret found for PAP login\n"));
817 ppp_panic("No auth secret");
877 char secret[MAXWORDLEN];
925 BZERO(secret, sizeof(secret));
1052 * secret that we could possibly use for authenticating `client'
1069 * get_secret - open the CHAP secret file and return the secret
1074 get_secret(int unit, char *client, char *server, char *secret, int *secret_len, int save_addrs) argument
1096 BCOPY(ppp_settings.passwd, secret, le
[all...]
/vbox/src/VBox/Frontends/VirtualBox/src/
H A Dmain.cpp137 void bt_sighandler (int sig, siginfo_t *info, void *secret) { argument
142 ucontext_t *uc = (ucontext_t *)secret;
/vbox/src/VBox/Devices/PC/ipxe/src/net/
H A Dtls.c271 * @v secret Secret
272 * @v secret_len Length of secret
279 void *secret, size_t secret_len,
290 /* Copy the secret, in case HMAC modifies it */
291 memcpy ( secret_copy, secret, secret_len );
292 secret = secret_copy;
293 DBGC2 ( tls, "TLS %p %s secret:\n", tls, digest->name );
294 DBGC2_HD ( tls, secret, secret_len );
297 hmac_init ( digest, digest_ctx, secret, &secret_len );
301 hmac_final ( digest, digest_ctx, secret,
277 tls_p_hash_va( struct tls_session *tls, struct digest_algorithm *digest, void *secret, size_t secret_len, void *out, size_t out_len, va_list seeds ) argument
345 tls_prf( struct tls_session *tls, void *secret, size_t secret_len, void *out, size_t out_len, ... ) argument
[all...]
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/mac/
H A Dmacsockotpt.c320 PRFilePrivate *secret = (PRFilePrivate *) contextPtr; local
321 _MDFileDesc * md = &(secret->md);
322 EndpointRef endpoint = (EndpointRef)secret->md.osfd;
339 readThread = secret->md.misc.thread;
340 secret->md.misc.thread = NULL;
341 secret->md.misc.cookie = cookie;
355 writeThread = secret->md.write.thread;
356 secret->md.write.thread = NULL;
357 secret->md.write.cookie = cookie;
362 secret
[all...]
/vbox/src/libs/xpcom18a4/nsprpub/pr/include/
H A Dprio.h163 PRFilePrivate *secret; /* layer dependent data */ member in struct:PRFileDesc
/vbox/src/VBox/Frontends/VBoxSDL/
H A DVBoxSDL.cpp703 void signal_handler_SIGUSR1(int sig, siginfo_t *info, void *secret) argument

Completed in 105 milliseconds