/titanic_50/usr/src/lib/gss_mechs/mech_krb5/include/ |
H A D | k5-int-pkinit.h | 43 krb5_int32 nonce; /* (0..4294967295) */ member 53 krb5_int32 nonce; /* (0..4294967295) */ member 136 krb5_int32 nonce; /* (0..4294967295) */ member 143 krb5_int32 nonce; /* (0..4294967295) */ member 155 krb5_int32 nonce; member
|
/titanic_50/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 182 unsigned char *nonce; member 219 unsigned char *nonce; member 2271 if (text->nonce) utils->free(text->nonce); 2303 if (reauth->nonce) utils->free(reauth->nonce); 2373 unsigned char *nonce, argument 2394 nonce, 2400 nonce, /* nonce from server */ 2424 nonce, /* nonce from server */ 2564 unsigned char *nonce; local 2633 nonce = create_nonce(sparams->utils); [all …]
|
/titanic_50/usr/src/uts/common/sys/usb/usba/ |
H A D | whcdi.h | 296 int PRF(const uchar_t *key, size_t klen, wusb_ccm_nonce_t *nonce, 301 #define PRF_64(key, klen, nonce, adata, alen, bdata, blen, out) \ argument 302 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 64) 304 #define PRF_128(key, klen, nonce, adata, alen, bdata, blen, out) \ argument 305 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 128) 307 #define PRF_256(key, klen, nonce, adata, alen, bdata, blen, out) \ argument 308 PRF(key, klen, nonce, adata, alen, bdata, blen, out, 256)
|
/titanic_50/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 103 krb5_int32 cusec, krb5_ui_4 nonce, 139 krb5_ui_4 nonce = 0; local 187 nonce = request->nonce; 190 nonce, &cksum, request->server, &out_data); 276 krb5_ui_4 nonce, argument 301 auth_pack9->pkAuthenticator.nonce = nonce; 318 auth_pack->pkAuthenticator.nonce = nonce; 846 if (key_pack9->nonce != request->nonce) { 847 pkiDebug("nonce in AS_REP=%d doesn't match AS_REQ=%d\n", key_pack9->nonce, request->nonce);
|
H A D | pkinit_srv.c | 819 dhkey_info.nonce = request->nonce; in pkinit_server_return_padata() 946 key_pack9->nonce = reqctx->rcv_auth_pack9->pkAuthenticator.nonce; in pkinit_server_return_padata()
|
/titanic_50/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | digest_md5.c | 74 const char *realm, *nonce, *cnonce, *qop, *user, *resp, *dom; member 253 MD5Update(&ctx, (CONST_UCHAR *) attr->nonce, attr->nlen); in digest_hash_a1() 306 MD5Update(&ctx, (CONST_UCHAR *) attr->nonce, attr->nlen); in digest_calc_resp() 360 if (attr->nonce == NULL || attr->nlen == 0 || in digest_client_resp() 412 attr->rlen, attr->realm, attr->nlen, attr->nonce, in digest_client_resp() 546 attr_out->nonce = val; in digest_parse()
|
/titanic_50/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | admin_cmds.c | 610 TPM_NONCE nonce; in createek() local 625 ValidationData.ulExternalDataLength = sizeof (nonce); in createek() 626 ValidationData.rgbExternalData = (BYTE *) &nonce; in createek() 627 ret = get_random(sizeof (nonce), (BYTE *) &nonce); in createek()
|
/titanic_50/usr/src/psm/stand/boot/sparc/common/ |
H A D | wanboot.c | 98 static char nonce[NONCELEN + 1]; variable 231 uint_t nlen = sizeof (nonce); in generate_nonce() 243 err = octet_to_hexascii(digest, sizeof (digest), nonce, &nlen); in generate_nonce() 249 nonce[NONCELEN] = '\0'; in generate_nonce() 250 return (nonce); in generate_nonce() 1475 bcmp(nonce, buf, NONCELEN) != 0) { in get_wanbootfs()
|
/titanic_50/usr/src/common/crypto/modes/ |
H A D | ccm.c | 645 ccm_format_initial_blocks(uchar_t *nonce, ulong_t nonceSize, in ccm_format_initial_blocks() argument 665 bcopy(nonce, &(b0[1]), nonceSize); in ccm_format_initial_blocks() 684 bcopy(nonce, &(cb[1]), nonceSize); in ccm_format_initial_blocks() 770 ccm_init(ccm_ctx_t *ctx, unsigned char *nonce, size_t nonce_len, in ccm_init() argument 789 ccm_format_initial_blocks(nonce, nonce_len, in ccm_init() 886 if (ccm_init(ccm_ctx, ccm_param->nonce, ccm_param->ulNonceSize, in ccm_init_ctx()
|
/titanic_50/usr/src/lib/print/libpapi-ipp/common/ |
H A D | ipp-support.c | 463 char nonce[HTTP_MAX_VALUE]; in setAuthString() local 472 "nonce", nonce); in setAuthString() 481 snprintf(line, sizeof (line), "%s:%s:%s", urp, mr, nonce); in setAuthString() 486 "uri=\"%s\", response=\"%s\"", user, realm, nonce, uri, in setAuthString()
|
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_in_tkt.c | 142 if (request->nonce == 0) { in send_as_request2() 145 request->nonce = (krb5_int32) time_now; in send_as_request2() 337 || (request->nonce != as_reply->enc_part2->nonce) in verify_as_reply() 588 request.nonce = 0; in krb5_get_in_tkt() 682 request.nonce = (krb5_int32) time_now; in krb5_get_in_tkt() 1041 request.nonce = 0; in krb5_get_init_creds() 1239 request.nonce = (krb5_int32) time_now; in krb5_get_init_creds()
|
H A D | rd_cred.c | 82 replaydata->seq = encpart.nonce; in krb5_rd_cred_basic()
|
H A D | mk_cred.c | 86 credenc.nonce = replaydata->seq; in krb5_mk_ncred_basic()
|
H A D | send_tgs.c | 198 rep->expected_nonce = tgsreq.nonce = (krb5_int32) time_now; in krb5_send_tgs2()
|
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/ |
H A D | wanboot-cgi.c | 324 create_nonce(const char *noncepath, const char *nonce) in create_nonce() argument 331 !write_buffer(fd, nonce, strlen(nonce))) { in create_nonce() 1265 wanbootfs_payload(const char *net, const char *cid, const char *nonce, in wanbootfs_payload() argument 1407 !create_nonce(noncepath, nonce)) { in wanbootfs_payload() 1687 char *nonce; in main() local 1705 if (!get_request_info(&content, &net, &cid, &nonce, &docroot)) { in main() 1796 if (!wanbootfs_payload(net, cid, nonce, in main()
|
/titanic_50/usr/src/uts/common/sys/crypto/ |
H A D | common.h | 83 uchar_t *nonce; member 133 caddr32_t nonce; member
|
/titanic_50/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_as_req.c | 402 reply_encpart.nonce = request->nonce; in process_as_req() 566 errpkt.ctime = request->nonce; in prepare_error_as()
|
H A D | do_tgs_req.c | 647 reply_encpart.nonce = request->nonce; in process_tgs_req() 770 errpkt.ctime = request->nonce; in prepare_error_tgs()
|
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_encode.c | 239 FIELDOF_NORM(krb5_enc_kdc_rep_part, int32, nonce, 2), 297 FIELDOF_NORM(struct kdc_req_hack, int32, v.nonce, 7), 1014 FIELDOF_OPT(krb5_cred_enc_part, int32, nonce, 1, 1), 1040 if (val->nonce) in optional_enc_cred_part() 1247 FIELDOF_NORM(krb5_fast_response, int32, nonce, 3), 1471 asn1_addfield(val->nonce, 2, asn1_encode_integer); in asn1_encode_pk_authenticator() 1483 asn1_addfield(val->nonce, 4, asn1_encode_integer); in asn1_encode_pk_authenticator_draft9() 1741 asn1_addfield(val->nonce, 1, asn1_encode_integer); in asn1_encode_kdc_dh_key_info() 1774 asn1_addfield(val->nonce, 1, asn1_encode_integer); in asn1_encode_reply_key_pack_draft9()
|
H A D | asn1_k_decode.c | 566 get_field(val->nonce,2,asn1_decode_int32); in asn1_decode_enc_kdc_rep_part() 654 get_field(val->nonce,7,asn1_decode_int32); in asn1_decode_kdc_req_body() 1316 get_field(val->nonce, 2, asn1_decode_int32); in asn1_decode_pk_authenticator() 1332 get_field(val->nonce, 4, asn1_decode_int32); in asn1_decode_pk_authenticator_draft9() 1429 get_field(val->nonce, 1, asn1_decode_int32); in asn1_decode_kdc_dh_key_info() 1452 get_field(val->nonce, 1, asn1_decode_int32); in asn1_decode_reply_key_pack_draft9()
|
/titanic_50/usr/src/uts/common/io/net80211/ |
H A D | net80211_crypto_ccmp.c | 443 cmparam.nonce = &b0[1]; /* N */ in ccmp_encrypt() 474 cmparam.nonce = &b0[1]; /* N */ in ccmp_decrypt()
|
/titanic_50/usr/src/lib/print/libhttp-core/common/ |
H A D | http.h | 321 char nonce[HTTP_MAX_VALUE]; member
|
H A D | http.c | 2247 memcpy(http->nonce, myhttp.nonce, sizeof(http->nonce)); in http_upgrade()
|
/titanic_50/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 554 static char *make_hashed(sasl_secret_t *sec, char *nonce, int noncelen, in make_hashed() argument 576 utils->hmac_md5((unsigned char *) nonce, noncelen, in make_hashed()
|
/titanic_50/usr/src/uts/common/inet/ |
H A D | sadb.h | 54 uint8_t nonce[MAXSALTSIZE + sizeof (uint64_t)]; member 59 #define param_nonce paramu.paramu_ccm.nonce
|