Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 52) sorted by relevance

123

/titanic_41/usr/src/lib/libnsl/key/
H A Dxcrypt.c80 xencrypt(secret, passwd) in xencrypt() argument
81 char *secret; in xencrypt()
90 len = (int)strlen(secret) / 2;
94 (void) hex2bin(len, secret, buf);
103 (void) bin2hex(len, (unsigned char *) buf, secret);
114 xdecrypt(secret, passwd) in xdecrypt() argument
115 char *secret; in xdecrypt()
124 len = (int)strlen(secret) / 2;
129 (void) hex2bin(len, secret, buf);
138 (void) bin2hex(len, (unsigned char *) buf, secret);
[all …]
H A Dgen_dhkeys.c112 __gen_dhkeys(public, secret, pass) in __gen_dhkeys() argument
114 char *secret;
150 (void) adjust(secret, xkey);
271 MINT *secret; in __gen_common_dhkeys_g() local
276 secret = mp_xtom(xsecret); in __gen_common_dhkeys_g()
278 mp_pow(public, secret, MODULUS_192_0, common); in __gen_common_dhkeys_g()
/titanic_41/usr/src/cmd/keyserv/
H A Dkeylogin.c114 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument
176 fprintf(rootfile, "%s\n", secret); in write_rootkey()
192 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey()
202 fprintf(rootfile, "%s\n", secret); in write_rootkey()
206 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey()
229 char secret[HEXKEYBYTES+1]; in oldkeylogin() local
232 if (getsecretkey(fullname, secret, pass) == 0) { in oldkeylogin()
251 if (secret[0] == 0) { in oldkeylogin()
259 memcpy(netst.st_priv_key, secret, HEXKEYBYTES); in oldkeylogin()
260 memset(secret, 0, HEXKEYBYTES); in oldkeylogin()
[all …]
H A Dchkey.c297 char *public, *secret; in makenewkeys() local
310 if (!(secret = malloc(hexkeylen))) { in makenewkeys()
316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys()
324 free(secret); in makenewkeys()
326 secret = NULL; in makenewkeys()
330 slist[mcount] = secret; in makenewkeys()
333 char *public, *secret; in makenewkeys() local
341 if (!(secret = malloc(HEXKEYBYTES + 1))) { in makenewkeys()
346 __gen_dhkeys(public, secret, short_login_pw); in makenewkeys()
349 slist[0] = secret; in makenewkeys()
[all …]
H A Dsetkey.c81 keybuf secret; member
450 cachehit3(keybuf3 *public, keybuf3 *secret, struct cachekey3_list *cp) in cachehit3() argument
453 cmpkeybuf3(secret, cp->secret)); in cachehit3()
579 keybuf3 *secret; in storeotherrootkeys() local
591 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys()
598 secret->keybuf3_val, secret->keybuf3_len, in storeotherrootkeys()
604 if (*secret->keybuf3_val == 0) { /* XXX */ in storeotherrootkeys()
610 skey.key = *secret; in storeotherrootkeys()
611 free(secret); /* but not the buffer it points to */ in storeotherrootkeys()
926 keybuf3 *secret, *public; in addmasterkey() local
[all …]
H A Dnewkey.c88 char secret[HEXKEYBYTES + 1]; in main() local
211 (void) __gen_dhkeys(public, secret, short_pass); in main()
213 (void) memcpy(crypt1, secret, HEXKEYBYTES); in main()
214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main()
246 setpublicmap(name, public, secret, database, pw) in setpublicmap() argument
250 char *secret;
258 (void) sprintf(pkent, "%s:%s", public, secret);
292 return (ldap_update("dh192-0", name, public, secret, pw));
H A Dkeylogout.c59 static char secret[HEXKEYBYTES + 1]; in main() local
78 if (key_setsecret(secret) < 0) { in main()
H A Dkeyserv_cache.c58 struct dhkey secret; member
115 keybuf3 *secret);
858 keybuf3 *secret) in cache_insert_ch() argument
875 (sk = keybuf3_2_dhkey(secret)) == 0) { in cache_insert_ch()
898 memcpy(&(skck->secret), sk, DHKEYSIZE(sk)); in cache_insert_ch()
962 cl->secret = MOVE_ADDR(cl->public->keybuf3_val, in copy_cl_item()
964 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3)); in copy_cl_item()
966 MOVE_ADDR(cl->secret->keybuf3_val, in copy_cl_item()
972 bin2hex(skck->secret.key, (u_char *)cl->secret->keybuf3_val, in copy_cl_item()
973 skck->secret.length); in copy_cl_item()
[all …]
H A Dkeyserv_cache.h62 keybuf3 *secret; member
80 keybuf3 *secret);
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dchap_ms.c286 ChapMS_NT(rchallenge, secret, secret_len, response) in ChapMS_NT() argument
288 char *secret;
307 unicodePassword[i * 2] = (u_char)secret[i];
321 ChapMS_LANMan(rchallenge, secret, secret_len, response) in ChapMS_LANMan() argument
323 char *secret;
335 islower(secret[i]) ? toupper(secret[i]) : secret[i]);
343 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len) in ChapMS() argument
347 char *secret;
358 CHAPDEBUG((LOG_INFO, "ChapMS: secret is '%.*s'", secret_len, secret));
363 ChapMS_NT(rchallenge, secret, secret_len, &response);
[all …]
H A Dauth.c1080 char secret[MAXWORDLEN]; local
1123 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) {
1128 } else if (secret[0] != '\0') {
1130 if ((!cryptpap && strcmp(passwd, secret) == 0)
1131 || strcmp(crypt(passwd, secret), secret) == 0)
1174 BZERO(secret, sizeof(secret));
1442 char secret[MAXWORDLEN]; local
1454 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename);
1455 ret = i >= 0 && secret[0] == '\0';
1456 BZERO(secret, sizeof(secret));
[all …]
H A Dchap.c440 char secret[MAXSECRETLEN]; local
512 secret, &secret_len, 0)) {
531 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len);
545 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
551 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len);
560 BZERO(secret, sizeof(secret));
580 char secret[MAXSECRETLEN]; local
647 } else if (!get_secret(cstate->unit, rhn, cstate->chal_name, secret,
661 MD5Update(&mdContext, (u_char *)secret, secret_len);
672 if (ChapMSValidate(cstate, remmd, remmd_len, secret,
[all …]
H A Dchap_ms.h38 char *secret, int secret_len));
40 u_char *response, int response_len, char *secret, int secret_len));
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DPlatformCommon.c103 char secret[MAX_ESCAPED_DOMAIN_NAME] = ""; in ReadDDNSSettingsFromConfFile() local
116 GetConfigOption(secret, "secret-64", f); // failure means no authentication in ReadDDNSSettingsFromConfFile()
126 if (domain && domain->c[0] && secret[0]) in ReadDDNSSettingsFromConfFile()
129 err = mDNS_SetSecretForZone(m, domain, domain, secret); in ReadDDNSSettingsFromConfFile()
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c106 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, in soft_ssl3_churn() argument
119 SHA1Update(&sha1_ctx, secret, secretlen); in soft_ssl3_churn()
125 MD5Update(&md5_ctx, secret, secretlen); in soft_ssl3_churn()
141 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in soft_tls_prf() argument
151 if (secret == NULL) { in soft_tls_prf()
162 S1 = secret; in soft_tls_prf()
163 S2 = secret + (secretlen / 2); /* Possible overlap of S1 and S2. */ in soft_tls_prf()
214 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in P_MD5() argument
232 bcopy(secret, md5_ipad, secretlen); in P_MD5()
233 bcopy(secret, md5_opad, secretlen); in P_MD5()
[all …]
/titanic_41/usr/src/lib/libsasl/lib/
H A Dcheckpw.c115 sasl_secret_t **secret) in _sasl_make_plain_secret() argument
119 sasl_secret_t **secret) in _sasl_make_plain_secret()
126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + in _sasl_make_plain_secret()
129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + in _sasl_make_plain_secret()
132 if (*secret == NULL) { in _sasl_make_plain_secret()
140 memcpy((*secret)->data, salt, 16); in _sasl_make_plain_secret()
141 (*secret)->data[16] = '\0'; in _sasl_make_plain_secret()
142 _sasl_MD5Final((*secret)->data + 17, &ctx); in _sasl_make_plain_secret()
143 (*secret)->len = sec_len; in _sasl_make_plain_secret()
/titanic_41/usr/src/uts/common/inet/sctp/
H A Dsctp_heartbeat.c276 uint64_t secret; in sctp_process_heartbeat() local
287 sizeof (sent) + sizeof (secret) + sizeof (addr))) { in sctp_process_heartbeat()
312 bcopy(++sentp, &secret, sizeof (secret)); in sctp_process_heartbeat()
322 if (secret != fp->sf_hb_secret) { in sctp_process_heartbeat()
/titanic_41/usr/src/cmd/cmd-crypto/tpmadm/
H A Dmain.c182 UINT32 secret_len, BYTE *secret) in set_policy_options() argument
188 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret); in set_policy_options()
209 UINT32 secret_len, BYTE *secret) in set_object_policy() argument
220 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret)); in set_object_policy()
H A Dtpmadm.h48 UINT32 secret_len, BYTE *secret);
50 UINT32 secret_len, BYTE *secret);
/titanic_41/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c368 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument
370 if(!utils || !secret || !(*secret)) return;
373 utils->erasebuffer((char *)(*secret)->data, (*secret)->len);
375 utils->erasebuffer((*secret)->data, (*secret)->len);
377 utils->free(*secret);
378 *secret = NULL;
/titanic_41/usr/src/pkg/manifests/
H A Dsystem-network.mf39 dir path=etc/inet/secret group=sys mode=0700
40 dir path=etc/inet/secret/ike.privatekeys group=sys mode=0700
69 file path=etc/inet/secret/ike.preshared group=sys mode=0600 \
70 original_name=SUNWcnetr:etc/inet/secret/ike.preshared preserve=true
71 file path=etc/inet/secret/ipseckeys.sample group=sys mode=0600
/titanic_41/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Dgeneric_key.c106 char *secret, /* Private key */ in __generic_gen_dhkeys() argument
161 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys()
H A Ddh_common.h46 char *public, char *secret, char *pass);
/titanic_41/usr/src/lib/libsasl/include/
H A Dplugin_common.h161 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret);
170 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **secret,
/titanic_41/usr/src/lib/sasl_plugins/cram/
H A Dcram.c557 char secret[65]; in make_hashed() local
565 memcpy(secret, sec->data, sec->len); in make_hashed()
569 secret[lup]='\0'; in make_hashed()
572 memcpy(secret, sec->data, 64); in make_hashed()
577 (unsigned char *) secret, 64, digest); in make_hashed()

123