Searched refs:secret (Results 1 - 19 of 19) sorted by relevance

/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Ddh_common.h46 char *public, char *secret, char *pass);
H A Dgeneric_key.c106 char *secret, /* Private key */
160 /* Set leading zeros if necessary and store in secret */
161 (void) adjust(secret, xkey, keylen);
102 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, char *public, char *secret, char *pass ) argument
/osnet-11/usr/src/lib/libnsl/key/
H A Dxcrypt.c75 * Encrypt a secret key given passwd
76 * The secret key is passed and returned in hex notation.
80 xencrypt(secret, passwd)
81 char *secret;
91 len = (int)strlen(secret) / 2;
95 (void) hex2bin(len, secret, buf);
104 (void) bin2hex(len, (unsigned char *) buf, secret);
116 * Decrypt secret key using passwd
117 * The secret key is passed and returned in hex notation.
121 xdecrypt(secret, passw
254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
H A Dgen_dhkeys.c109 * public and secret are buffers of size HEXKEYBYTES + 1.
112 __gen_dhkeys(public, secret, pass)
114 char *secret;
150 (void) adjust(secret, xkey);
271 MINT *secret; local
276 secret = mp_xtom(xsecret);
278 mp_pow(public, secret, MODULUS_192_0, common);
/osnet-11/usr/src/lib/libsasl/lib/
H A Dcheckpw.c106 /* we store the following secret to check plaintext passwords:
108 * <salt> \0 <secret>
110 * where <secret> = MD5(<salt>, "sasldb", <pass>)
115 sasl_secret_t **secret)
119 sasl_secret_t **secret)
126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) +
129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) +
132 if (*secret == NULL) {
140 memcpy((*secret)->data, salt, 16);
141 (*secret)
113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument
[all...]
H A Dsaslint.h191 sasl_secret_t *secret; member in struct:sasl_conn
H A Dcommon.c548 conn->secret = NULL;
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c73 static uchar_t TLS_MASTER_SECRET_LABEL[] = {"master secret"};
88 static void P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label,
91 static void P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label,
98 static void soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret,
104 * Called for derivation of the master secret from the pre-master secret,
109 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument
122 SHA1Update(&sha1_ctx, secret, secretlen);
128 MD5Update(&md5_ctx, secret, secretlen);
137 * {secret, labe
144 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen) argument
217 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument
297 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument
1060 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/CGI/examples/
H A Dmultiple_forms.cgi28 print "<P>What's the password? ",$query->password_field('pass','secret');
44 <P>The secret password is <EM>$Q::pass</EM>
/osnet-11/usr/src/lib/libsasl/include/
H A Dplugin_common.h159 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret);
168 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **secret,
/osnet-11/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c367 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument
369 if(!utils || !secret || !(*secret)) return;
372 utils->erasebuffer((char *)(*secret)->data, (*secret)->len);
374 utils->erasebuffer((*secret)->data, (*secret)->len);
376 utils->free(*secret);
377 *secret = NULL;
/osnet-11/usr/src/lib/sasl_plugins/cram/
H A Dcram.c307 gettext("no secret in database"));
310 "no secret in database");
321 gettext("empty secret"));
324 "empty secret");
341 /* Do precalculation on plaintext secret */
346 /* We have a precomputed secret */
352 "Have neither type of secret");
355 "Have neither type of secret");
555 char secret[65]; local
563 memcpy(secret, se
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Drsa.c91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
119 /* Decrypt using the secret key. */
120 secret (decr_plaintext, ciphertext, sk);
129 /* Use the RSA secret function to create a signature of the plaintext. */
130 secret (signature, plaintext, sk);
237 /* select two (very secret) primes */
282 /* calculate the secret key d = e^1 mod phi */
531 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */
576 * Test wether the secret key is valid.
668 log_info ( "RSA secret ke
693 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function
[all...]
H A Dprimegen.c34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel,
291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret.
755 gen_prime (unsigned int nbits, int secret, int randomlevel,
774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits );
787 generating a secret prime we are most probably doing that
791 if (secret)
825 if (!mpi_test_bit( ptest, nbits-1-secret ))
753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
H A Dac.c114 gcry_ac_key_t secret;
1664 key_pair_new->secret = key_secret;
1702 key = key_pair->secret;
1747 gcry_ac_key_destroy (key_pair->secret);
1942 DATA_ENCRYPTED with the secret key KEY under the control of the
2019 /* Signs the data contained in DATA with the secret key KEY and stores
2094 in DATA with the secret key belonging to the public key KEY. */
2975 with the secret key KEY_SECRET according to the Encryption Scheme
3091 secret key KEY according to the Signature Scheme SCHEME_ID. Handle
3185 is of size M_N, with the secret ke
113 gcry_ac_key_t secret; member in struct:gcry_ac_key_pair
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Drsa.c90 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
118 /* Decrypt using the secret key. */
119 secret (decr_plaintext, ciphertext, sk);
128 /* Use the RSA secret function to create a signature of the plaintext. */
129 secret (signature, plaintext, sk);
236 /* select two (very secret) primes */
281 /* calculate the secret key d = e^1 mod phi */
530 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */
575 * Test wether the secret key is valid.
667 log_info ( "RSA secret ke
692 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function
[all...]
H A Dprimegen.c33 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel,
290 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret.
754 gen_prime (unsigned int nbits, int secret, int randomlevel,
773 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits );
786 generating a secret prime we are most probably doing that
790 if (secret)
824 if (!mpi_test_bit( ptest, nbits-1-secret ))
752 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
/osnet-11/usr/src/common/crypto/ecc/
H A Dec.c540 ** curve point in derived secret. If successful, derivedSecret->data
542 ** derived secret, and derivedSecret->len is the size of the secret
544 ** buffer containing the derived secret.
597 /* Allocate memory for the derived secret and copy
1091 EC_FreeDerivedKey(SECItem *secret, boolean_t freeit) argument
1093 SECITEM_FreeItem(secret, freeit);
/osnet-11/usr/src/lib/libnsl/common/
H A Dllib-lnsl129 void __gen_dhkeys(char *public, char *secret, char *pass);
138 int xencrypt(char *secret, char *passwd);
139 int xdecrypt(char *secret, char *passwd);

Completed in 113 milliseconds