/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/include/ |
H A D | k5-int-pkinit.h | 43 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_pk_authenticator 53 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_pk_authenticator_draft9 136 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_kdc_dh_key_info 143 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_kdc_dh_key_info_draft9 155 krb5_int32 nonce; member in struct:_krb5_reply_key_pack_draft9
|
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 182 unsigned char *nonce; member in struct:reauth_entry 219 unsigned char *nonce; member in struct:context 330 unsigned char *pszNonce, /* nonce from server */ 332 unsigned char *pszCNonce, /* client nonce */ 2271 if (text->nonce) utils->free(text->nonce); 2303 if (reauth->nonce) utils->free(reauth->nonce); 2336 int stale; /* last nonce is stale */ 2373 unsigned char *nonce, 2371 create_response(context_t * text, const sasl_utils_t * utils, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, char *digesturi, HASH Secret, char *authorization_id, char **response_value) argument 2564 unsigned char *nonce; local 2852 unsigned char *nonce = NULL, *cnonce = NULL; local 3846 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument [all...] |
/illumos-gate/usr/src/uts/common/sys/usb/usba/ |
H A D | whcdi.h | 296 int PRF(const uchar_t *key, size_t klen, wusb_ccm_nonce_t *nonce, 301 #define PRF_64(key, klen, nonce, adata, alen, bdata, blen, out) \ 302 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 64) 304 #define PRF_128(key, klen, nonce, adata, alen, bdata, blen, out) \ 305 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 128) 307 #define PRF_256(key, klen, nonce, adata, alen, bdata, blen, out) \ 308 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 256)
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 103 krb5_int32 cusec, krb5_ui_4 nonce, 139 krb5_ui_4 nonce = 0; local 182 /* XXX PKINIT RFC says that nonce in PKAuthenticator doesn't have be the 183 * same as in the AS_REQ. However, if we pick a different nonce, then we 185 * reuse the AS_REQ nonce. 187 nonce = request->nonce; 190 nonce, &cksum, request->server, &out_data); 276 krb5_ui_4 nonce, 301 auth_pack9->pkAuthenticator.nonce 271 pkinit_as_req_create(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_timestamp ctsec, krb5_int32 cusec, krb5_ui_4 nonce, const krb5_checksum * cksum, krb5_principal server, krb5_data ** as_req) argument [all...] |
H A D | pkinit_srv.c | 819 dhkey_info.nonce = request->nonce; 871 * requesting that a checksum is send back instead of the nonce 879 pkiDebug("%s: return checksum instead of nonce = %d\n", 883 * in the reply instead of the nonce, create an RFC-style keypack 938 * expects back a nonce, create it now 946 key_pack9->nonce = reqctx->rcv_auth_pack9->pkAuthenticator.nonce;
|
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | admin_cmds.c | 610 TPM_NONCE nonce; local 625 ValidationData.ulExternalDataLength = sizeof (nonce); 626 ValidationData.rgbExternalData = (BYTE *) &nonce; 627 ret = get_random(sizeof (nonce), (BYTE *) &nonce);
|
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | ipp-support.c | 463 char nonce[HTTP_MAX_VALUE]; local 472 "nonce", nonce); 481 snprintf(line, sizeof (line), "%s:%s:%s", urp, mr, nonce); 485 "Digest username=\"%s\", realm=\"%s\", nonce=\"%s\", " 486 "uri=\"%s\", response=\"%s\"", user, realm, nonce, uri,
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/ |
H A D | wanboot-cgi.c | 324 create_nonce(const char *noncepath, const char *nonce) argument 331 !write_buffer(fd, nonce, strlen(nonce))) { 332 print_status(500, "(error creating nonce file)"); 1265 wanbootfs_payload(const char *net, const char *cid, const char *nonce, argument 1404 * Create the /nonce file. 1406 if ((noncepath = make_path(bootfs_dir, "nonce")) == NULL || 1407 !create_nonce(noncepath, nonce)) { 1687 char *nonce; local 1705 if (!get_request_info(&content, &net, &cid, &nonce, [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_in_tkt.c | 141 /* set the nonce if the caller expects us to do it */ 142 if (request->nonce == 0) { 145 request->nonce = (krb5_int32) time_now; 337 || (request->nonce != as_reply->enc_part2->nonce) 588 request.nonce = 0; 682 request.nonce = (krb5_int32) time_now; 1040 /* request.nonce is filled in when we send a request to the kdc */ 1041 request.nonce = 0; 1171 /* nonce i [all...] |
H A D | rd_cred.c | 82 replaydata->seq = encpart.nonce; 171 * outputs the nonce and an array of the forwarded credentials.
|
H A D | mk_cred.c | 86 credenc.nonce = replaydata->seq;
|
H A D | send_tgs.c | 198 rep->expected_nonce = tgsreq.nonce = (krb5_int32) time_now;
|
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 74 const char *realm, *nonce, *cnonce, *qop, *user, *resp, *dom; member in struct:__anon3486 85 * Make a nonce (NUL terminated) 240 * Compute MD5("<hash_pass>:<nonce>:<cnonce>") 253 MD5Update(&ctx, (CONST_UCHAR *) attr->nonce, attr->nlen); 306 MD5Update(&ctx, (CONST_UCHAR *) attr->nonce, attr->nlen); 350 "username=\"%.*s\",realm=\"%.*s\",nonce=\"%.*s\",nc=%.*s,cnonce=\""; 360 if (attr->nonce == NULL || attr->nlen == 0 || 410 /* generate string up to the client nonce */ 412 attr->rlen, attr->realm, attr->nlen, attr->nonce, 416 /* generate client nonce */ [all...] |
/illumos-gate/usr/src/common/crypto/modes/ |
H A D | ccm.c | 599 /* Check the nonce length. Valid values are 7, 8, 9, 10, 11, 12, 13 */ 645 ccm_format_initial_blocks(uchar_t *nonce, ulong_t nonceSize, argument 664 /* copy the nonce value into b0 */ 665 bcopy(nonce, &(b0[1]), nonceSize); 683 /* copy the nonce value into the counter block */ 684 bcopy(nonce, &(cb[1]), nonceSize); 688 /* Create the mask for the counter field based on the size of nonce */ 700 * even with the biggest nonce of 13, the last byte of the 770 ccm_init(ccm_ctx_t *ctx, unsigned char *nonce, size_t nonce_len, argument 789 ccm_format_initial_blocks(nonce, nonce_le [all...] |
/illumos-gate/usr/src/psm/stand/boot/sparc/common/ |
H A D | wanboot.c | 96 #define WANBOOTFS_NONCE_FILE "/nonce" 98 static char nonce[NONCELEN + 1]; variable 231 uint_t nlen = sizeof (nonce); 243 err = octet_to_hexascii(digest, sizeof (digest), nonce, &nlen); 246 "cannot convert nonce to ASCII: error %d", err); 249 nonce[NONCELEN] = '\0'; 250 return (nonce); 315 * If the URL type requires a nonce, then supply it. 1363 * routine will also verify that the nonce received in the reply matches 1463 * The wanboot file system should contain a nonce [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_encode.c | 238 /* nonce[2] INTEGER */ 239 FIELDOF_NORM(krb5_enc_kdc_rep_part, int32, nonce, 2), 297 FIELDOF_NORM(struct kdc_req_hack, int32, v.nonce, 7), 1013 /* nonce[1] INTEGER OPTIONAL */ 1014 FIELDOF_OPT(krb5_cred_enc_part, int32, nonce, 1, 1), 1040 if (val->nonce) 1247 FIELDOF_NORM(krb5_fast_response, int32, nonce, 3), 1471 asn1_addfield(val->nonce, 2, asn1_encode_integer); 1483 asn1_addfield(val->nonce, 4, asn1_encode_integer); 1741 asn1_addfield(val->nonce, [all...] |
H A D | asn1_k_decode.c | 566 get_field(val->nonce,2,asn1_decode_int32); 654 get_field(val->nonce,7,asn1_decode_int32); 1316 get_field(val->nonce, 2, asn1_decode_int32); 1332 get_field(val->nonce, 4, asn1_decode_int32); 1429 get_field(val->nonce, 1, asn1_decode_int32); 1452 get_field(val->nonce, 1, asn1_decode_int32);
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 402 reply_encpart.nonce = request->nonce; 566 errpkt.ctime = request->nonce;
|
H A D | do_tgs_req.c | 647 reply_encpart.nonce = request->nonce; 770 errpkt.ctime = request->nonce;
|
/illumos-gate/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 443 cmparam.nonce = &b0[1]; /* N */ 474 cmparam.nonce = &b0[1]; /* N */
|
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | common.h | 83 uchar_t *nonce; member in struct:CK_AES_CCM_PARAMS 133 caddr32_t nonce; member in struct:CK_AES_CCM_PARAMS32
|
/illumos-gate/usr/src/lib/print/libhttp-core/common/ |
H A D | http.h | 321 char nonce[HTTP_MAX_VALUE]; member in struct:__anon4296
|
H A D | http.c | 2247 memcpy(http->nonce, myhttp.nonce, sizeof(http->nonce));
|
/illumos-gate/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 213 /* get time and a random number for the nonce */ 366 -do an md5update with the nonce 554 static char *make_hashed(sasl_secret_t *sec, char *nonce, int noncelen, argument 576 utils->hmac_md5((unsigned char *) nonce, noncelen,
|
/illumos-gate/usr/src/uts/common/inet/ |
H A D | sadb.h | 45 * and nonce values change for each packet. For non-combined mode 54 uint8_t nonce[MAXSALTSIZE + sizeof (uint64_t)]; member in struct:ipsa_cm_mech_s 59 #define param_nonce paramu.paramu_ccm.nonce 84 * portion of the nonce is transmitted over the network with each packet 91 * The nonce structure is defined like this in the SA (ipsa_t)to ensure 93 * be incremented as an uint64_t. The nonce as used by the algorithms is
|