/titanic_41/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 80 xencrypt(secret, passwd) in xencrypt() argument 81 char *secret; in xencrypt() 90 len = (int)strlen(secret) / 2; 94 (void) hex2bin(len, secret, buf); 103 (void) bin2hex(len, (unsigned char *) buf, secret); 114 xdecrypt(secret, passwd) in xdecrypt() argument 115 char *secret; in xdecrypt() 124 len = (int)strlen(secret) / 2; 129 (void) hex2bin(len, secret, buf); 138 (void) bin2hex(len, (unsigned char *) buf, secret); [all …]
|
H A D | gen_dhkeys.c | 112 __gen_dhkeys(public, secret, pass) in __gen_dhkeys() argument 114 char *secret; 150 (void) adjust(secret, xkey); 271 MINT *secret; in __gen_common_dhkeys_g() local 276 secret = mp_xtom(xsecret); in __gen_common_dhkeys_g() 278 mp_pow(public, secret, MODULUS_192_0, common); in __gen_common_dhkeys_g()
|
/titanic_41/usr/src/cmd/keyserv/ |
H A D | keylogin.c | 114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument 176 fprintf(rootfile, "%s\n", secret); in write_rootkey() 192 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey() 202 fprintf(rootfile, "%s\n", secret); in write_rootkey() 206 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey() 229 char secret[HEXKEYBYTES+1]; in oldkeylogin() local 232 if (getsecretkey(fullname, secret, pass) == 0) { in oldkeylogin() 251 if (secret[0] == 0) { in oldkeylogin() 259 memcpy(netst.st_priv_key, secret, HEXKEYBYTES); in oldkeylogin() 260 memset(secret, 0, HEXKEYBYTES); in oldkeylogin() [all …]
|
H A D | chkey.c | 297 char *public, *secret; in makenewkeys() local 310 if (!(secret = malloc(hexkeylen))) { in makenewkeys() 316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys() 324 free(secret); in makenewkeys() 326 secret = NULL; in makenewkeys() 330 slist[mcount] = secret; in makenewkeys() 333 char *public, *secret; in makenewkeys() local 341 if (!(secret = malloc(HEXKEYBYTES + 1))) { in makenewkeys() 346 __gen_dhkeys(public, secret, short_login_pw); in makenewkeys() 349 slist[0] = secret; in makenewkeys() [all …]
|
H A D | setkey.c | 81 keybuf secret; member 450 cachehit3(keybuf3 *public, keybuf3 *secret, struct cachekey3_list *cp) in cachehit3() argument 453 cmpkeybuf3(secret, cp->secret)); in cachehit3() 579 keybuf3 *secret; in storeotherrootkeys() local 591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys() 598 secret->keybuf3_val, secret->keybuf3_len, in storeotherrootkeys() 604 if (*secret->keybuf3_val == 0) { /* XXX */ in storeotherrootkeys() 610 skey.key = *secret; in storeotherrootkeys() 611 free(secret); /* but not the buffer it points to */ in storeotherrootkeys() 926 keybuf3 *secret, *public; in addmasterkey() local [all …]
|
H A D | newkey.c | 88 char secret[HEXKEYBYTES + 1]; in main() local 211 (void) __gen_dhkeys(public, secret, short_pass); in main() 213 (void) memcpy(crypt1, secret, HEXKEYBYTES); in main() 214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main() 246 setpublicmap(name, public, secret, database, pw) in setpublicmap() argument 250 char *secret; 258 (void) sprintf(pkent, "%s:%s", public, secret); 292 return (ldap_update("dh192-0", name, public, secret, pw));
|
H A D | keylogout.c | 59 static char secret[HEXKEYBYTES + 1]; in main() local 78 if (key_setsecret(secret) < 0) { in main()
|
H A D | keyserv_cache.c | 58 struct dhkey secret; member 115 keybuf3 *secret); 858 keybuf3 *secret) in cache_insert_ch() argument 875 (sk = keybuf3_2_dhkey(secret)) == 0) { in cache_insert_ch() 898 memcpy(&(skck->secret), sk, DHKEYSIZE(sk)); in cache_insert_ch() 962 cl->secret = MOVE_ADDR(cl->public->keybuf3_val, in copy_cl_item() 964 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3)); in copy_cl_item() 966 MOVE_ADDR(cl->secret->keybuf3_val, in copy_cl_item() 972 bin2hex(skck->secret.key, (u_char *)cl->secret->keybuf3_val, in copy_cl_item() 973 skck->secret.length); in copy_cl_item() [all …]
|
H A D | keyserv_cache.h | 62 keybuf3 *secret; member 80 keybuf3 *secret);
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | chap_ms.c | 286 ChapMS_NT(rchallenge, secret, secret_len, response) in ChapMS_NT() argument 288 char *secret; 307 unicodePassword[i * 2] = (u_char)secret[i]; 321 ChapMS_LANMan(rchallenge, secret, secret_len, response) in ChapMS_LANMan() argument 323 char *secret; 335 islower(secret[i]) ? toupper(secret[i]) : secret[i]); 343 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len) in ChapMS() argument 347 char *secret; 358 CHAPDEBUG((LOG_INFO, "ChapMS: secret is '%.*s'", secret_len, secret)); 363 ChapMS_NT(rchallenge, secret, secret_len, &response); [all …]
|
H A D | auth.c | 1080 char secret[MAXWORDLEN]; local 1123 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) { 1128 } else if (secret[0] != '\0') { 1130 if ((!cryptpap && strcmp(passwd, secret) == 0) 1131 || strcmp(crypt(passwd, secret), secret) == 0) 1174 BZERO(secret, sizeof(secret)); 1442 char secret[MAXWORDLEN]; local 1454 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename); 1455 ret = i >= 0 && secret[0] == '\0'; 1456 BZERO(secret, sizeof(secret)); [all …]
|
H A D | chap.c | 440 char secret[MAXSECRETLEN]; local 512 secret, &secret_len, 0)) { 531 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len); 545 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 551 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len); 560 BZERO(secret, sizeof(secret)); 580 char secret[MAXSECRETLEN]; local 647 } else if (!get_secret(cstate->unit, rhn, cstate->chal_name, secret, 661 MD5Update(&mdContext, (u_char *)secret, secret_len); 672 if (ChapMSValidate(cstate, remmd, remmd_len, secret, [all …]
|
H A D | chap_ms.h | 38 char *secret, int secret_len)); 40 u_char *response, int response_len, char *secret, int secret_len));
|
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | PlatformCommon.c | 103 char secret[MAX_ESCAPED_DOMAIN_NAME] = ""; in ReadDDNSSettingsFromConfFile() local 116 GetConfigOption(secret, "secret-64", f); // failure means no authentication in ReadDDNSSettingsFromConfFile() 126 if (domain && domain->c[0] && secret[0]) in ReadDDNSSettingsFromConfFile() 129 err = mDNS_SetSecretForZone(m, domain, domain, secret); in ReadDDNSSettingsFromConfFile()
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, in soft_ssl3_churn() argument 119 SHA1Update(&sha1_ctx, secret, secretlen); in soft_ssl3_churn() 125 MD5Update(&md5_ctx, secret, secretlen); in soft_ssl3_churn() 141 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in soft_tls_prf() argument 151 if (secret == NULL) { in soft_tls_prf() 162 S1 = secret; in soft_tls_prf() 163 S2 = secret + (secretlen / 2); /* Possible overlap of S1 and S2. */ in soft_tls_prf() 214 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in P_MD5() argument 232 bcopy(secret, md5_ipad, secretlen); in P_MD5() 233 bcopy(secret, md5_opad, secretlen); in P_MD5() [all …]
|
/titanic_41/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 115 sasl_secret_t **secret) in _sasl_make_plain_secret() argument 119 sasl_secret_t **secret) in _sasl_make_plain_secret() 126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + in _sasl_make_plain_secret() 129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + in _sasl_make_plain_secret() 132 if (*secret == NULL) { in _sasl_make_plain_secret() 140 memcpy((*secret)->data, salt, 16); in _sasl_make_plain_secret() 141 (*secret)->data[16] = '\0'; in _sasl_make_plain_secret() 142 _sasl_MD5Final((*secret)->data + 17, &ctx); in _sasl_make_plain_secret() 143 (*secret)->len = sec_len; in _sasl_make_plain_secret()
|
/titanic_41/usr/src/uts/common/inet/sctp/ |
H A D | sctp_heartbeat.c | 276 uint64_t secret; in sctp_process_heartbeat() local 287 sizeof (sent) + sizeof (secret) + sizeof (addr))) { in sctp_process_heartbeat() 312 bcopy(++sentp, &secret, sizeof (secret)); in sctp_process_heartbeat() 322 if (secret != fp->sf_hb_secret) { in sctp_process_heartbeat()
|
/titanic_41/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | main.c | 182 UINT32 secret_len, BYTE *secret) in set_policy_options() argument 188 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret); in set_policy_options() 209 UINT32 secret_len, BYTE *secret) in set_object_policy() argument 220 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret)); in set_object_policy()
|
H A D | tpmadm.h | 48 UINT32 secret_len, BYTE *secret); 50 UINT32 secret_len, BYTE *secret);
|
/titanic_41/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 368 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 370 if(!utils || !secret || !(*secret)) return; 373 utils->erasebuffer((char *)(*secret)->data, (*secret)->len); 375 utils->erasebuffer((*secret)->data, (*secret)->len); 377 utils->free(*secret); 378 *secret = NULL;
|
/titanic_41/usr/src/pkg/manifests/ |
H A D | system-network.mf | 39 dir path=etc/inet/secret group=sys mode=0700 40 dir path=etc/inet/secret/ike.privatekeys group=sys mode=0700 69 file path=etc/inet/secret/ike.preshared group=sys mode=0600 \ 70 original_name=SUNWcnetr:etc/inet/secret/ike.preshared preserve=true 71 file path=etc/inet/secret/ipseckeys.sample group=sys mode=0600
|
/titanic_41/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 106 char *secret, /* Private key */ in __generic_gen_dhkeys() argument 161 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys()
|
H A D | dh_common.h | 46 char *public, char *secret, char *pass);
|
/titanic_41/usr/src/lib/libsasl/include/ |
H A D | plugin_common.h | 161 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret); 170 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **secret,
|
/titanic_41/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 557 char secret[65]; in make_hashed() local 565 memcpy(secret, sec->data, sec->len); in make_hashed() 569 secret[lup]='\0'; in make_hashed() 572 memcpy(secret, sec->data, 64); in make_hashed() 577 (unsigned char *) secret, 64, digest); in make_hashed()
|