/vbox/src/VBox/Devices/PC/ipxe/src/util/ |
H A D | mucurses_test.c | 10 char secret[16]; local 15 get_iscsi_chap_secret(secret); 17 mvwprintw( stdscr, 3, 5, "password is \"%s\"", secret ); 26 char *title = "Set new iSCSI CHAP secret", 27 *msg = "Configure the iSCSI access secret", 29 WINDOW *secret; local 31 secret = newwin( stdscr->height / 2, 36 wborder( secret, '|', '|', '-', '-', '+', '+', '+', '+' ); 37 mvwprintw( secret, 1, 2, "%s", title ); 38 mvwhline( secret, [all...] |
/vbox/src/VBox/Devices/Network/lwip/src/netif/ppp/ |
H A D | chap.c | 422 char secret[MAXSECRETLEN]; local 465 /* get secret for authenticating ourselves with the specified host */ 467 secret, &secret_len, 0)) { 468 secret_len = 0; /* assume null secret if can't find one */ 469 CHAPDEBUG((LOG_WARNING, "No CHAP secret found for authenticating us to %s\n", rhostname)); 485 MD5Update(&mdContext, (u_char*)secret, secret_len); 494 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 503 BZERO(secret, sizeof(secret)); 518 char secret[MAXSECRETLE local [all...] |
H A D | chpms.c | 125 char *secret, 142 char *secret, 152 CHAPDEBUG((LOG_INFO, "ChapMS: secret is '%.*s'\n", secret_len, secret)); 157 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, &response); 160 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, &response); 343 char *secret, 353 /* Initialize the Unicode version of the secret (== password). */ 357 unicodePassword[i * 2] = (u_char)secret[i]; 378 char *secret, 138 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len ) argument 340 ChapMS_NT( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response ) argument 375 ChapMS_LANMan( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response ) argument [all...] |
H A D | auth.c | 297 AUTHDEBUG((LOG_ERR, "No secret found for PAP login\n")); 519 char secret[MAXWORDLEN]; 562 BZERO(secret, sizeof(secret)); 594 * get_secret - open the CHAP secret file and return the secret 602 char *secret, 622 BCOPY(ppp_settings.passwd, secret, len); 634 /* XXX Find secret. */ 646 BCOPY(secbuf, secret, le 598 get_secret( int unit, char *client, char *server, char *secret, int *secret_len, int save_addrs ) argument [all...] |
/vbox/src/VBox/Devices/Network/lwip-new/src/netif/ppp/ |
H A D | chap.c | 428 char secret[MAXSECRETLEN]; local 472 /* get secret for authenticating ourselves with the specified host */ 474 secret, &secret_len, 0)) { 475 secret_len = 0; /* assume null secret if can't find one */ 476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n", 494 MD5Update(&mdContext, (u_char*)secret, secret_len); 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 512 BZERO(secret, sizeof(secret)); 528 char secret[MAXSECRETLE local [all...] |
H A D | chpms.c | 133 char *secret, 307 char *secret, 318 /* Initialize the Unicode version of the secret (== password). */ 322 unicodePassword[i * 2] = (u_char)secret[i]; 346 char *secret, 357 UcasePassword[i] = (u_char)toupper(secret[i]); 366 ChapMS( chap_state *cstate, char *rchallenge, int rchallenge_len, char *secret, int secret_len) argument 374 CHAPDEBUG(LOG_INFO, ("ChapMS: secret is '%.*s'\n", secret_len, secret)); 379 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_le 305 ChapMS_NT( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument 344 ChapMS_LANMan( char *rchallenge, int rchallenge_len, char *secret, int secret_len, MS_ChapResponse *response) argument [all...] |
H A D | auth.c | 507 AUTHDEBUG(LOG_ERR, ("No secret found for PAP login\n")); 817 ppp_panic("No auth secret"); 877 char secret[MAXWORDLEN]; 925 BZERO(secret, sizeof(secret)); 1052 * secret that we could possibly use for authenticating `client' 1069 * get_secret - open the CHAP secret file and return the secret 1074 get_secret(int unit, char *client, char *server, char *secret, int *secret_len, int save_addrs) argument 1096 BCOPY(ppp_settings.passwd, secret, le [all...] |
/vbox/src/VBox/Frontends/VirtualBox/src/ |
H A D | main.cpp | 137 void bt_sighandler (int sig, siginfo_t *info, void *secret) { argument 142 ucontext_t *uc = (ucontext_t *)secret;
|
/vbox/src/VBox/Devices/PC/ipxe/src/net/ |
H A D | tls.c | 271 * @v secret Secret 272 * @v secret_len Length of secret 279 void *secret, size_t secret_len, 290 /* Copy the secret, in case HMAC modifies it */ 291 memcpy ( secret_copy, secret, secret_len ); 292 secret = secret_copy; 293 DBGC2 ( tls, "TLS %p %s secret:\n", tls, digest->name ); 294 DBGC2_HD ( tls, secret, secret_len ); 297 hmac_init ( digest, digest_ctx, secret, &secret_len ); 301 hmac_final ( digest, digest_ctx, secret, 277 tls_p_hash_va( struct tls_session *tls, struct digest_algorithm *digest, void *secret, size_t secret_len, void *out, size_t out_len, va_list seeds ) argument 345 tls_prf( struct tls_session *tls, void *secret, size_t secret_len, void *out, size_t out_len, ... ) argument [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/src/md/mac/ |
H A D | macsockotpt.c | 320 PRFilePrivate *secret = (PRFilePrivate *) contextPtr; local 321 _MDFileDesc * md = &(secret->md); 322 EndpointRef endpoint = (EndpointRef)secret->md.osfd; 339 readThread = secret->md.misc.thread; 340 secret->md.misc.thread = NULL; 341 secret->md.misc.cookie = cookie; 355 writeThread = secret->md.write.thread; 356 secret->md.write.thread = NULL; 357 secret->md.write.cookie = cookie; 362 secret [all...] |
/vbox/src/libs/xpcom18a4/nsprpub/pr/include/ |
H A D | prio.h | 163 PRFilePrivate *secret; /* layer dependent data */ member in struct:PRFileDesc
|
/vbox/src/VBox/Frontends/VBoxSDL/ |
H A D | VBoxSDL.cpp | 703 void signal_handler_SIGUSR1(int sig, siginfo_t *info, void *secret) argument
|