/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 80 xencrypt(secret, passwd) in xencrypt() argument 81 char *secret; in xencrypt() 90 len = (int)strlen(secret) / 2; 94 (void) hex2bin(len, secret, buf); 103 (void) bin2hex(len, (unsigned char *) buf, secret); 114 xdecrypt(secret, passwd) in xdecrypt() argument 115 char *secret; in xdecrypt() 124 len = (int)strlen(secret) / 2; 129 (void) hex2bin(len, secret, buf); 138 (void) bin2hex(len, (unsigned char *) buf, secret); [all …]
|
H A D | gen_dhkeys.c | 110 __gen_dhkeys(public, secret, pass) in __gen_dhkeys() argument 112 char *secret; 148 (void) adjust(secret, xkey); 269 MINT *secret; in __gen_common_dhkeys_g() local 274 secret = mp_xtom(xsecret); in __gen_common_dhkeys_g() 276 mp_pow(public, secret, MODULUS_192_0, common); in __gen_common_dhkeys_g()
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | chap_ms.c | 279 ChapMS_NT(rchallenge, secret, secret_len, response) in ChapMS_NT() argument 281 char *secret; 300 unicodePassword[i * 2] = (u_char)secret[i]; 314 ChapMS_LANMan(rchallenge, secret, secret_len, response) in ChapMS_LANMan() argument 316 char *secret; 328 islower(secret[i]) ? toupper(secret[i]) : secret[i]); 336 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len) in ChapMS() argument 340 char *secret; 351 CHAPDEBUG((LOG_INFO, "ChapMS: secret is '%.*s'", secret_len, secret)); 356 ChapMS_NT(rchallenge, secret, secret_len, &response); [all …]
|
H A D | auth.c | 1077 char secret[MAXWORDLEN]; local 1120 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) { 1125 } else if (secret[0] != '\0') { 1127 if ((!cryptpap && strcmp(passwd, secret) == 0) 1128 || strcmp(crypt(passwd, secret), secret) == 0) 1171 BZERO(secret, sizeof(secret)); 1435 char secret[MAXWORDLEN]; local 1447 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename); 1448 ret = i >= 0 && secret[0] == '\0'; 1449 BZERO(secret, sizeof(secret)); [all …]
|
H A D | chap.c | 430 char secret[MAXSECRETLEN]; local 502 secret, &secret_len, 0)) { 521 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len); 535 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 541 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len); 550 BZERO(secret, sizeof(secret)); 570 char secret[MAXSECRETLEN]; local 637 } else if (!get_secret(cstate->unit, rhn, cstate->chal_name, secret, 651 MD5Update(&mdContext, (u_char *)secret, secret_len); 662 if (ChapMSValidate(cstate, remmd, remmd_len, secret, [all …]
|
H A D | chap_ms.h | 36 char *secret, int secret_len)); 38 u_char *response, int response_len, char *secret, int secret_len));
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keylogin.c | 112 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument 174 fprintf(rootfile, "%s\n", secret); in write_rootkey() 190 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey() 200 fprintf(rootfile, "%s\n", secret); in write_rootkey() 204 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey() 227 char secret[HEXKEYBYTES+1]; in oldkeylogin() local 230 if (getsecretkey(fullname, secret, pass) == 0) { in oldkeylogin() 249 if (secret[0] == 0) { in oldkeylogin() 257 memcpy(netst.st_priv_key, secret, HEXKEYBYTES); in oldkeylogin() 258 memset(secret, 0, HEXKEYBYTES); in oldkeylogin() [all …]
|
H A D | chkey.c | 297 char *public, *secret; in makenewkeys() local 310 if (!(secret = malloc(hexkeylen))) { in makenewkeys() 316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys() 324 free(secret); in makenewkeys() 326 secret = NULL; in makenewkeys() 330 slist[mcount] = secret; in makenewkeys() 333 char *public, *secret; in makenewkeys() local 341 if (!(secret = malloc(HEXKEYBYTES + 1))) { in makenewkeys() 346 __gen_dhkeys(public, secret, short_login_pw); in makenewkeys() 349 slist[0] = secret; in makenewkeys() [all …]
|
H A D | setkey.c | 79 keybuf secret; member 448 cachehit3(keybuf3 *public, keybuf3 *secret, struct cachekey3_list *cp) in cachehit3() argument 451 cmpkeybuf3(secret, cp->secret)); in cachehit3() 577 keybuf3 *secret; in storeotherrootkeys() local 589 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys() 596 secret->keybuf3_val, secret->keybuf3_len, in storeotherrootkeys() 602 if (*secret->keybuf3_val == 0) { /* XXX */ in storeotherrootkeys() 608 skey.key = *secret; in storeotherrootkeys() 609 free(secret); /* but not the buffer it points to */ in storeotherrootkeys() 924 keybuf3 *secret, *public; in addmasterkey() local [all …]
|
H A D | newkey.c | 88 char secret[HEXKEYBYTES + 1]; in main() local 211 (void) __gen_dhkeys(public, secret, short_pass); in main() 213 (void) memcpy(crypt1, secret, HEXKEYBYTES); in main() 214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main() 246 setpublicmap(name, public, secret, database, pw) in setpublicmap() argument 250 char *secret; 258 (void) sprintf(pkent, "%s:%s", public, secret); 292 return (ldap_update("dh192-0", name, public, secret, pw));
|
H A D | keyserv_cache.c | 56 struct dhkey secret; member 113 keybuf3 *secret); 856 keybuf3 *secret) in cache_insert_ch() argument 873 (sk = keybuf3_2_dhkey(secret)) == 0) { in cache_insert_ch() 896 memcpy(&(skck->secret), sk, DHKEYSIZE(sk)); in cache_insert_ch() 960 cl->secret = MOVE_ADDR(cl->public->keybuf3_val, in copy_cl_item() 962 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3)); in copy_cl_item() 964 MOVE_ADDR(cl->secret->keybuf3_val, in copy_cl_item() 970 bin2hex(skck->secret.key, (u_char *)cl->secret->keybuf3_val, in copy_cl_item() 971 skck->secret.length); in copy_cl_item() [all …]
|
H A D | keylogout.c | 57 static char secret[HEXKEYBYTES + 1]; in main() local 76 if (key_setsecret(secret) < 0) { in main()
|
H A D | keyserv_cache.h | 60 keybuf3 *secret; member 78 keybuf3 *secret);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 108 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, in soft_ssl3_churn() argument 121 SHA1Update(&sha1_ctx, secret, secretlen); in soft_ssl3_churn() 127 MD5Update(&md5_ctx, secret, secretlen); in soft_ssl3_churn() 143 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in soft_tls_prf() argument 153 if (secret == NULL) { in soft_tls_prf() 164 S1 = secret; in soft_tls_prf() 165 S2 = secret + (secretlen / 2); /* Possible overlap of S1 and S2. */ in soft_tls_prf() 216 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in P_MD5() argument 234 bcopy(secret, md5_ipad, secretlen); in P_MD5() 235 bcopy(secret, md5_opad, secretlen); in P_MD5() [all …]
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 114 sasl_secret_t **secret) in _sasl_make_plain_secret() argument 118 sasl_secret_t **secret) in _sasl_make_plain_secret() 125 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + in _sasl_make_plain_secret() 128 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + in _sasl_make_plain_secret() 131 if (*secret == NULL) { in _sasl_make_plain_secret() 139 memcpy((*secret)->data, salt, 16); in _sasl_make_plain_secret() 140 (*secret)->data[16] = '\0'; in _sasl_make_plain_secret() 141 _sasl_MD5Final((*secret)->data + 17, &ctx); in _sasl_make_plain_secret() 142 (*secret)->len = sec_len; in _sasl_make_plain_secret()
|
/illumos-gate/usr/src/uts/common/inet/sctp/ |
H A D | sctp_heartbeat.c | 276 uint64_t secret; in sctp_process_heartbeat() local 287 sizeof (sent) + sizeof (secret) + sizeof (addr))) { in sctp_process_heartbeat() 312 bcopy(++sentp, &secret, sizeof (secret)); in sctp_process_heartbeat() 322 if (secret != fp->sf_hb_secret) { in sctp_process_heartbeat()
|
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | main.c | 183 UINT32 secret_len, BYTE *secret) in set_policy_options() argument 189 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret); in set_policy_options() 210 UINT32 secret_len, BYTE *secret) in set_object_policy() argument 221 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret)); in set_object_policy()
|
H A D | tpmadm.h | 48 UINT32 secret_len, BYTE *secret); 50 UINT32 secret_len, BYTE *secret);
|
/illumos-gate/usr/src/pkg/manifests/ |
H A D | system-network.p5m | 61 dir path=etc/inet/secret group=sys mode=0700 62 file path=etc/inet/secret/ike.preshared group=sys mode=0600 \ 63 original_name=SUNWcnetr:etc/inet/secret/ike.preshared preserve=true 64 dir path=etc/inet/secret/ike.privatekeys group=sys mode=0700 65 file path=etc/inet/secret/ipseckeys.sample group=sys mode=0600 66 file path=etc/inet/secret/tcpkeys.sample group=sys mode=0600
|
/illumos-gate/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 367 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 369 if(!utils || !secret || !(*secret)) return; 372 utils->erasebuffer((char *)(*secret)->data, (*secret)->len); 374 utils->erasebuffer((*secret)->data, (*secret)->len); 376 utils->free(*secret); 377 *secret = NULL;
|
/illumos-gate/usr/src/test/os-tests/tests/execvpe/ |
H A D | execvpe-script | 32 if [[ "$EXECVPE_TEST" != "Keep it secret, keep it safe!" ]]; then 33 printf "execvpe wrapper did not set the secret phrase!\n"
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 104 char *secret, /* Private key */ in __generic_gen_dhkeys() argument 159 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys()
|
H A D | dh_common.h | 44 char *public, char *secret, char *pass);
|
/illumos-gate/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 556 char secret[65]; in make_hashed() local 564 memcpy(secret, sec->data, sec->len); in make_hashed() 568 secret[lup]='\0'; in make_hashed() 571 memcpy(secret, sec->data, 64); in make_hashed() 576 (unsigned char *) secret, 64, digest); in make_hashed()
|
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | plugin_common.h | 161 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret); 170 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **secret,
|