| /illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
| H A D | chap_ms.h | 38 char *secret, int secret_len)); 40 u_char *response, int response_len, char *secret, int secret_len));
|
| H A D | chap_ms.c | 286 ChapMS_NT(rchallenge, secret, secret_len, response) 288 char *secret; 303 /* Initialize the Unicode version of the secret (== password). */ 307 unicodePassword[i * 2] = (u_char)secret[i]; 321 ChapMS_LANMan(rchallenge, secret, secret_len, response) 323 char *secret; 335 islower(secret[i]) ? toupper(secret[i]) : secret[i]); 343 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_le 631 rhostname, secret, secret_len); local [all...] |
| H A D | chap.c | 440 char secret[MAXSECRETLEN]; local 510 /* get secret for authenticating ourselves with the specified host */ 512 secret, &secret_len, 0)) { 513 secret_len = 0; /* assume null secret if can't find one */ 514 warn("No CHAP secret found for authenticating us (%q) to %q", 531 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len); 545 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 551 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len); 560 BZERO(secret, sizeof(secret)); 580 char secret[MAXSECRETLEN]; local [all...] |
| H A D | auth.c | 595 error("No secret found for PAP login"); 1003 "but I couldn't find any suitable secret (password) for it to use to do so."); 1080 char secret[MAXWORDLEN]; local 1111 * Open the file of pap secrets and scan for a suitable secret 1123 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) { 1124 warn("no PAP secret found for %s", user); 1128 } else if (secret[0] != '\0') { 1130 if ((!cryptpap && strcmp(passwd, secret) == 0) 1131 || strcmp(crypt(passwd, secret), secret) 1442 char secret[MAXWORDLEN]; local 1483 char secret[MAXWORDLEN]; local [all...] |
| /illumos-gate/usr/src/cmd/keyserv/ |
| H A D | keylogin.c | 42 * Set secret key on local machine 112 /* write unencrypted secret key into root key file */ 114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument 176 fprintf(rootfile, "%s\n", secret); 192 fprintf(rootfile, "%s %d\n", secret, algtype); 202 fprintf(rootfile, "%s\n", secret); 206 fprintf(rootfile, "%s %d\n", secret, algtype); 214 fprintf(stderr, "Wrote secret key into %s\n", ROOTKEY_FILE); 229 char secret[HEXKEYBYTES+1]; local 232 if (getsecretkey(fullname, secret, pas 291 static char secret[HEXKEYBYTES + 1]; local 326 char secret[4096]; local [all...] |
| H A D | keylogout.c | 43 * unset the secret key on local machine 59 static char secret[HEXKEYBYTES + 1]; local 74 fprintf(stderr, "Could not unset your secret key.\n"); 78 if (key_setsecret(secret) < 0) { 80 fprintf(stderr, "Could not unset your secret key.\n");
|
| H A D | chkey.c | 85 char **slist = NULL; /* List of secret key(s) */ 86 char **clist = NULL; /* List of encrypted secret key(s) */ 155 /* Encrypt secret key(s) with login_pw */ 193 fprintf(stderr, "%s: Could not encrypt any secret keys.\n", 200 /* Initialize the array of public, secret, and encrypted secret keys */ 289 /* Generate a new set of public/secret key pair(s) */ 297 char *public, *secret; local 310 if (!(secret = malloc(hexkeylen))) { 316 if (!(__gen_dhkeys_g(public, secret, CURMEC 333 char *public, *secret; local 495 char *secret; local 567 char *secret = NULL; local 616 char *secret = slist[0]; local 733 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) argument [all...] |
| H A D | keyserv_cache.h | 62 keybuf3 *secret; member in struct:cachekey3_list 80 keybuf3 *secret);
|
| H A D | newkey.c | 88 char secret[HEXKEYBYTES + 1]; local 211 (void) __gen_dhkeys(public, secret, short_pass); 213 (void) memcpy(crypt1, secret, HEXKEYBYTES); 214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 246 setpublicmap(name, public, secret, database, pw) 250 char *secret; 258 (void) sprintf(pkent, "%s:%s", public, secret); 292 return (ldap_update("dh192-0", name, public, secret, pw));
|
| H A D | setkey.c | 41 * Store secret keys. Compute common keys, 81 keybuf secret; member in struct:cachekey_list 450 cachehit3(keybuf3 *public, keybuf3 *secret, struct cachekey3_list *cp) argument 453 cmpkeybuf3(secret, cp->secret)); 579 keybuf3 *secret; local 591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { 598 secret->keybuf3_val, secret->keybuf3_len, 601 ("Can't find %s's secret ke 926 keybuf3 *secret, *public; local 1286 MINT *secret; local 1365 map_ps2cache(keybuf3 *public, keybuf3 *secret, struct psdata *pdp) argument 1381 getdeskey3( keylen_t keylen, algtype_t algtype, int desarylen, keybuf3 *public, keybuf3 *secret, uid_t uid ) argument 1649 MINT *secret; local [all...] |
| H A D | keyserv_cache.c | 58 struct dhkey secret; member in struct:skck 70 * 8 * ( ( ( sizeof(struct skck) - 1 + secret.length ) - 1 ) / 8 + 1 ) 115 keybuf3 *secret); 858 keybuf3 *secret) 875 (sk = keybuf3_2_dhkey(secret)) == 0) { 898 memcpy(&(skck->secret), sk, DHKEYSIZE(sk)); 962 cl->secret = MOVE_ADDR(cl->public->keybuf3_val, 964 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3)); 966 MOVE_ADDR(cl->secret 852 cache_insert_ch( struct cachekey_header *ch, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument 1203 cache_insert( keylen_t keylen, algtype_t algtype, uid_t uid, deskeyarray common, des_block key, keybuf3 *public, keybuf3 *secret) argument [all...] |
| /illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
| H A D | dh_common.h | 46 char *public, char *secret, char *pass);
|
| H A D | generic_key.c | 106 char *secret, /* Private key */ 160 /* Set leading zeros if necessary and store in secret */ 161 (void) adjust(secret, xkey, keylen); 102 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, char *public, char *secret, char *pass ) argument
|
| /illumos-gate/usr/src/lib/libnsl/key/ |
| H A D | xcrypt.c | 75 * Encrypt a secret key given passwd 76 * The secret key is passed and returned in hex notation. 80 xencrypt(secret, passwd) 81 char *secret; 90 len = (int)strlen(secret) / 2; 94 (void) hex2bin(len, secret, buf); 103 (void) bin2hex(len, (unsigned char *) buf, secret); 109 * Decrypt secret key using passwd 110 * The secret key is passed and returned in hex notation. 114 xdecrypt(secret, passw 240 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 345 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
| H A D | gen_dhkeys.c | 109 * public and secret are buffers of size HEXKEYBYTES + 1. 112 __gen_dhkeys(public, secret, pass) 114 char *secret; 150 (void) adjust(secret, xkey); 271 MINT *secret; local 276 secret = mp_xtom(xsecret); 278 mp_pow(public, secret, MODULUS_192_0, common);
|
| /illumos-gate/usr/src/cmd/cmd-inet/etc/secret/ |
| H A D | Makefile | 24 # cmd/cmd-inet/etc/secret/Makefile 27 SECRETDIR= secret 37 # Be extra paranoid about /etc/inet/secret
|
| /illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
| H A D | tpmadm.h | 48 UINT32 secret_len, BYTE *secret); 50 UINT32 secret_len, BYTE *secret);
|
| H A D | main.c | 182 UINT32 secret_len, BYTE *secret) 188 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret); 190 print_error(ret, gettext("Set policy secret")); 209 UINT32 secret_len, BYTE *secret) 220 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret)); 181 set_policy_options(TSS_HPOLICY hPolicy, TSS_FLAG mode, char *prompt, UINT32 secret_len, BYTE *secret) argument 208 set_object_policy(TSS_HOBJECT handle, TSS_FLAG mode, char *prompt, UINT32 secret_len, BYTE *secret) argument
|
| /illumos-gate/usr/src/lib/libsasl/lib/ |
| H A D | checkpw.c | 106 /* we store the following secret to check plaintext passwords: 108 * <salt> \0 <secret> 110 * where <secret> = MD5(<salt>, "sasldb", <pass>) 115 sasl_secret_t **secret) 119 sasl_secret_t **secret) 126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + 129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + 132 if (*secret == NULL) { 140 memcpy((*secret)->data, salt, 16); 141 (*secret) 113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument [all...] |
| /illumos-gate/usr/src/uts/common/inet/sctp/ |
| H A D | sctp_heartbeat.c | 113 * a 64 bit secret, followed by the v6 (possible a v4mapped) address this 167 * The per peer address secret is used to make sure that the heartbeat 268 * put the timestamp, a secret and the peer address the heartbeat is 276 uint64_t secret; local 287 sizeof (sent) + sizeof (secret) + sizeof (addr))) { 311 /* Grab the secret to make sure that this heartbeat is valid */ 312 bcopy(++sentp, &secret, sizeof (secret)); 322 if (secret != fp->sf_hb_secret) { 324 ("sctp_process_heartbeat: invalid secret i [all...] |
| /illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
| H A D | softSSL.c | 73 static uchar_t TLS_MASTER_SECRET_LABEL[] = {"master secret"}; 101 * Called for derivation of the master secret from the pre-master secret, 106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument 119 SHA1Update(&sha1_ctx, secret, secretlen); 125 MD5Update(&md5_ctx, secret, secretlen); 134 * {secret, label, seed} into any arbitrary length string of pseudo 136 * Here, it is called for the derivation of the master secret from the 137 * pre-master secret, and for the derivation of the key_block in a TLS 141 soft_tls_prf(uchar_t *secret, uint_ argument 214 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 294 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 1054 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument [all...] |
| /illumos-gate/usr/src/cmd/cmd-inet/etc/ |
| H A D | Makefile | 30 SUBDIRS= default dhcp init.d ike nca ppp secret sock2path.d
|
| /illumos-gate/usr/src/lib/libsasl/include/ |
| H A D | plugin_common.h | 161 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret); 170 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **secret,
|
| /illumos-gate/usr/src/lib/libsasl/plugin/ |
| H A D | plugin_common.c | 368 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 370 if(!utils || !secret || !(*secret)) return; 373 utils->erasebuffer((char *)(*secret)->data, (*secret)->len); 375 utils->erasebuffer((*secret)->data, (*secret)->len); 377 utils->free(*secret); 378 *secret = NULL;
|
| /illumos-gate/usr/src/lib/sasl_plugins/cram/ |
| H A D | cram.c | 309 gettext("no secret in database")); 312 "no secret in database"); 323 gettext("empty secret")); 326 "empty secret"); 343 /* Do precalculation on plaintext secret */ 348 /* We have a precomputed secret */ 354 "Have neither type of secret"); 357 "Have neither type of secret"); 557 char secret[65]; local 565 memcpy(secret, se [all...] |