Searched refs:nonce (Results 1 - 25 of 33) sorted by relevance

12

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/include/
H A Dk5-int-pkinit.h43 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_pk_authenticator
53 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_pk_authenticator_draft9
136 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_kdc_dh_key_info
143 krb5_int32 nonce; /* (0..4294967295) */ member in struct:_krb5_kdc_dh_key_info_draft9
155 krb5_int32 nonce; member in struct:_krb5_reply_key_pack_draft9
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c182 unsigned char *nonce; member in struct:reauth_entry
219 unsigned char *nonce; member in struct:context
330 unsigned char *pszNonce, /* nonce from server */
332 unsigned char *pszCNonce, /* client nonce */
2271 if (text->nonce) utils->free(text->nonce);
2303 if (reauth->nonce) utils->free(reauth->nonce);
2336 int stale; /* last nonce is stale */
2373 unsigned char *nonce,
2371 create_response(context_t * text, const sasl_utils_t * utils, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, char *digesturi, HASH Secret, char *authorization_id, char **response_value) argument
2564 unsigned char *nonce; local
2852 unsigned char *nonce = NULL, *cnonce = NULL; local
3846 calculate_response(context_t * text, const sasl_utils_t * utils, unsigned char *username, unsigned char *realm, unsigned char *nonce, unsigned int ncvalue, unsigned char *cnonce, char *qop, unsigned char *digesturi, sasl_secret_t * passwd, unsigned char *authorization_id, char **response_value) argument
[all...]
/illumos-gate/usr/src/uts/common/sys/usb/usba/
H A Dwhcdi.h296 int PRF(const uchar_t *key, size_t klen, wusb_ccm_nonce_t *nonce,
301 #define PRF_64(key, klen, nonce, adata, alen, bdata, blen, out) \
302 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 64)
304 #define PRF_128(key, klen, nonce, adata, alen, bdata, blen, out) \
305 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 128)
307 #define PRF_256(key, klen, nonce, adata, alen, bdata, blen, out) \
308 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 256)
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_clnt.c103 krb5_int32 cusec, krb5_ui_4 nonce,
139 krb5_ui_4 nonce = 0; local
182 /* XXX PKINIT RFC says that nonce in PKAuthenticator doesn't have be the
183 * same as in the AS_REQ. However, if we pick a different nonce, then we
185 * reuse the AS_REQ nonce.
187 nonce = request->nonce;
190 nonce, &cksum, request->server, &out_data);
276 krb5_ui_4 nonce,
301 auth_pack9->pkAuthenticator.nonce
271 pkinit_as_req_create(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_timestamp ctsec, krb5_int32 cusec, krb5_ui_4 nonce, const krb5_checksum * cksum, krb5_principal server, krb5_data ** as_req) argument
[all...]
H A Dpkinit_srv.c819 dhkey_info.nonce = request->nonce;
871 * requesting that a checksum is send back instead of the nonce
879 pkiDebug("%s: return checksum instead of nonce = %d\n",
883 * in the reply instead of the nonce, create an RFC-style keypack
938 * expects back a nonce, create it now
946 key_pack9->nonce = reqctx->rcv_auth_pack9->pkAuthenticator.nonce;
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/
H A Dadmin_cmds.c610 TPM_NONCE nonce; local
625 ValidationData.ulExternalDataLength = sizeof (nonce);
626 ValidationData.rgbExternalData = (BYTE *) &nonce;
627 ret = get_random(sizeof (nonce), (BYTE *) &nonce);
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dipp-support.c463 char nonce[HTTP_MAX_VALUE]; local
472 "nonce", nonce);
481 snprintf(line, sizeof (line), "%s:%s:%s", urp, mr, nonce);
485 "Digest username=\"%s\", realm=\"%s\", nonce=\"%s\", "
486 "uri=\"%s\", response=\"%s\"", user, realm, nonce, uri,
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/
H A Dwanboot-cgi.c324 create_nonce(const char *noncepath, const char *nonce) argument
331 !write_buffer(fd, nonce, strlen(nonce))) {
332 print_status(500, "(error creating nonce file)");
1265 wanbootfs_payload(const char *net, const char *cid, const char *nonce, argument
1404 * Create the /nonce file.
1406 if ((noncepath = make_path(bootfs_dir, "nonce")) == NULL ||
1407 !create_nonce(noncepath, nonce)) {
1687 char *nonce; local
1705 if (!get_request_info(&content, &net, &cid, &nonce,
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dget_in_tkt.c141 /* set the nonce if the caller expects us to do it */
142 if (request->nonce == 0) {
145 request->nonce = (krb5_int32) time_now;
337 || (request->nonce != as_reply->enc_part2->nonce)
588 request.nonce = 0;
682 request.nonce = (krb5_int32) time_now;
1040 /* request.nonce is filled in when we send a request to the kdc */
1041 request.nonce = 0;
1171 /* nonce i
[all...]
H A Drd_cred.c82 replaydata->seq = encpart.nonce;
171 * outputs the nonce and an array of the forwarded credentials.
H A Dmk_cred.c86 credenc.nonce = replaydata->seq;
H A Dsend_tgs.c198 rep->expected_nonce = tgsreq.nonce = (krb5_int32) time_now;
/illumos-gate/usr/src/lib/libldap5/sources/ldap/common/
H A Ddigest_md5.c74 const char *realm, *nonce, *cnonce, *qop, *user, *resp, *dom; member in struct:__anon3486
85 * Make a nonce (NUL terminated)
240 * Compute MD5("<hash_pass>:<nonce>:<cnonce>")
253 MD5Update(&ctx, (CONST_UCHAR *) attr->nonce, attr->nlen);
306 MD5Update(&ctx, (CONST_UCHAR *) attr->nonce, attr->nlen);
350 "username=\"%.*s\",realm=\"%.*s\",nonce=\"%.*s\",nc=%.*s,cnonce=\"";
360 if (attr->nonce == NULL || attr->nlen == 0 ||
410 /* generate string up to the client nonce */
412 attr->rlen, attr->realm, attr->nlen, attr->nonce,
416 /* generate client nonce */
[all...]
/illumos-gate/usr/src/common/crypto/modes/
H A Dccm.c599 /* Check the nonce length. Valid values are 7, 8, 9, 10, 11, 12, 13 */
645 ccm_format_initial_blocks(uchar_t *nonce, ulong_t nonceSize, argument
664 /* copy the nonce value into b0 */
665 bcopy(nonce, &(b0[1]), nonceSize);
683 /* copy the nonce value into the counter block */
684 bcopy(nonce, &(cb[1]), nonceSize);
688 /* Create the mask for the counter field based on the size of nonce */
700 * even with the biggest nonce of 13, the last byte of the
770 ccm_init(ccm_ctx_t *ctx, unsigned char *nonce, size_t nonce_len, argument
789 ccm_format_initial_blocks(nonce, nonce_le
[all...]
/illumos-gate/usr/src/psm/stand/boot/sparc/common/
H A Dwanboot.c96 #define WANBOOTFS_NONCE_FILE "/nonce"
98 static char nonce[NONCELEN + 1]; variable
231 uint_t nlen = sizeof (nonce);
243 err = octet_to_hexascii(digest, sizeof (digest), nonce, &nlen);
246 "cannot convert nonce to ASCII: error %d", err);
249 nonce[NONCELEN] = '\0';
250 return (nonce);
315 * If the URL type requires a nonce, then supply it.
1363 * routine will also verify that the nonce received in the reply matches
1463 * The wanboot file system should contain a nonce
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/
H A Dasn1_k_encode.c238 /* nonce[2] INTEGER */
239 FIELDOF_NORM(krb5_enc_kdc_rep_part, int32, nonce, 2),
297 FIELDOF_NORM(struct kdc_req_hack, int32, v.nonce, 7),
1013 /* nonce[1] INTEGER OPTIONAL */
1014 FIELDOF_OPT(krb5_cred_enc_part, int32, nonce, 1, 1),
1040 if (val->nonce)
1247 FIELDOF_NORM(krb5_fast_response, int32, nonce, 3),
1471 asn1_addfield(val->nonce, 2, asn1_encode_integer);
1483 asn1_addfield(val->nonce, 4, asn1_encode_integer);
1741 asn1_addfield(val->nonce,
[all...]
H A Dasn1_k_decode.c566 get_field(val->nonce,2,asn1_decode_int32);
654 get_field(val->nonce,7,asn1_decode_int32);
1316 get_field(val->nonce, 2, asn1_decode_int32);
1332 get_field(val->nonce, 4, asn1_decode_int32);
1429 get_field(val->nonce, 1, asn1_decode_int32);
1452 get_field(val->nonce, 1, asn1_decode_int32);
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Ddo_as_req.c402 reply_encpart.nonce = request->nonce;
566 errpkt.ctime = request->nonce;
H A Ddo_tgs_req.c647 reply_encpart.nonce = request->nonce;
770 errpkt.ctime = request->nonce;
/illumos-gate/usr/src/uts/common/io/net80211/
H A Dnet80211_crypto_ccmp.c443 cmparam.nonce = &b0[1]; /* N */
474 cmparam.nonce = &b0[1]; /* N */
/illumos-gate/usr/src/uts/common/sys/crypto/
H A Dcommon.h83 uchar_t *nonce; member in struct:CK_AES_CCM_PARAMS
133 caddr32_t nonce; member in struct:CK_AES_CCM_PARAMS32
/illumos-gate/usr/src/lib/print/libhttp-core/common/
H A Dhttp.h321 char nonce[HTTP_MAX_VALUE]; member in struct:__anon4296
H A Dhttp.c2247 memcpy(http->nonce, myhttp.nonce, sizeof(http->nonce));
/illumos-gate/usr/src/lib/sasl_plugins/cram/
H A Dcram.c213 /* get time and a random number for the nonce */
366 -do an md5update with the nonce
554 static char *make_hashed(sasl_secret_t *sec, char *nonce, int noncelen, argument
576 utils->hmac_md5((unsigned char *) nonce, noncelen,
/illumos-gate/usr/src/uts/common/inet/
H A Dsadb.h45 * and nonce values change for each packet. For non-combined mode
54 uint8_t nonce[MAXSALTSIZE + sizeof (uint64_t)]; member in struct:ipsa_cm_mech_s
59 #define param_nonce paramu.paramu_ccm.nonce
84 * portion of the nonce is transmitted over the network with each packet
91 * The nonce structure is defined like this in the SA (ipsa_t)to ensure
93 * be incremented as an uint64_t. The nonce as used by the algorithms is

Completed in 128 milliseconds

12