Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 50) sorted by relevance

12

/illumos-gate/usr/src/lib/libnsl/key/
H A Dxcrypt.c80 xencrypt(secret, passwd) in xencrypt() argument
81 char *secret; in xencrypt()
90 len = (int)strlen(secret) / 2;
94 (void) hex2bin(len, secret, buf);
103 (void) bin2hex(len, (unsigned char *) buf, secret);
114 xdecrypt(secret, passwd) in xdecrypt() argument
115 char *secret; in xdecrypt()
124 len = (int)strlen(secret) / 2;
129 (void) hex2bin(len, secret, buf);
138 (void) bin2hex(len, (unsigned char *) buf, secret);
[all …]
H A Dgen_dhkeys.c110 __gen_dhkeys(public, secret, pass) in __gen_dhkeys() argument
112 char *secret;
148 (void) adjust(secret, xkey);
269 MINT *secret; in __gen_common_dhkeys_g() local
274 secret = mp_xtom(xsecret); in __gen_common_dhkeys_g()
276 mp_pow(public, secret, MODULUS_192_0, common); in __gen_common_dhkeys_g()
/illumos-gate/usr/src/cmd/keyserv/
H A Dkeylogin.c112 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype) in write_rootkey() argument
174 fprintf(rootfile, "%s\n", secret); in write_rootkey()
190 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey()
200 fprintf(rootfile, "%s\n", secret); in write_rootkey()
204 fprintf(rootfile, "%s %d\n", secret, algtype); in write_rootkey()
227 char secret[HEXKEYBYTES+1]; in oldkeylogin() local
230 if (getsecretkey(fullname, secret, pass) == 0) { in oldkeylogin()
249 if (secret[0] == 0) { in oldkeylogin()
257 memcpy(netst.st_priv_key, secret, HEXKEYBYTES); in oldkeylogin()
258 memset(secret, 0, HEXKEYBYTES); in oldkeylogin()
[all …]
H A Dchkey.c297 char *public, *secret; in makenewkeys() local
310 if (!(secret = malloc(hexkeylen))) { in makenewkeys()
316 if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen, in makenewkeys()
324 free(secret); in makenewkeys()
326 secret = NULL; in makenewkeys()
330 slist[mcount] = secret; in makenewkeys()
333 char *public, *secret; in makenewkeys() local
341 if (!(secret = malloc(HEXKEYBYTES + 1))) { in makenewkeys()
346 __gen_dhkeys(public, secret, short_login_pw); in makenewkeys()
349 slist[0] = secret; in makenewkeys()
[all …]
H A Dsetkey.c79 keybuf secret; member
448 cachehit3(keybuf3 *public, keybuf3 *secret, struct cachekey3_list *cp) in cachehit3() argument
451 cmpkeybuf3(secret, cp->secret)); in cachehit3()
577 keybuf3 *secret; in storeotherrootkeys() local
589 if ((secret = getkeybuf3(kp->keylen/4+1)) == NULL) { in storeotherrootkeys()
596 secret->keybuf3_val, secret->keybuf3_len, in storeotherrootkeys()
602 if (*secret->keybuf3_val == 0) { /* XXX */ in storeotherrootkeys()
608 skey.key = *secret; in storeotherrootkeys()
609 free(secret); /* but not the buffer it points to */ in storeotherrootkeys()
924 keybuf3 *secret, *public; in addmasterkey() local
[all …]
H A Dnewkey.c88 char secret[HEXKEYBYTES + 1]; in main() local
211 (void) __gen_dhkeys(public, secret, short_pass); in main()
213 (void) memcpy(crypt1, secret, HEXKEYBYTES); in main()
214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main()
246 setpublicmap(name, public, secret, database, pw) in setpublicmap() argument
250 char *secret;
258 (void) sprintf(pkent, "%s:%s", public, secret);
292 return (ldap_update("dh192-0", name, public, secret, pw));
H A Dkeyserv_cache.c56 struct dhkey secret; member
113 keybuf3 *secret);
856 keybuf3 *secret) in cache_insert_ch() argument
873 (sk = keybuf3_2_dhkey(secret)) == 0) { in cache_insert_ch()
896 memcpy(&(skck->secret), sk, DHKEYSIZE(sk)); in cache_insert_ch()
960 cl->secret = MOVE_ADDR(cl->public->keybuf3_val, in copy_cl_item()
962 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3)); in copy_cl_item()
964 MOVE_ADDR(cl->secret->keybuf3_val, in copy_cl_item()
970 bin2hex(skck->secret.key, (u_char *)cl->secret->keybuf3_val, in copy_cl_item()
971 skck->secret.length); in copy_cl_item()
[all …]
H A Dkeylogout.c57 static char secret[HEXKEYBYTES + 1]; in main() local
76 if (key_setsecret(secret) < 0) { in main()
H A Dkeyserv_cache.h60 keybuf3 *secret; member
78 keybuf3 *secret);
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/
H A Dchap_ms.c279 ChapMS_NT(rchallenge, secret, secret_len, response) in ChapMS_NT() argument
281 char *secret;
300 unicodePassword[i * 2] = (u_char)secret[i];
314 ChapMS_LANMan(rchallenge, secret, secret_len, response) in ChapMS_LANMan() argument
316 char *secret;
328 islower(secret[i]) ? toupper(secret[i]) : secret[i]);
336 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len) in ChapMS() argument
340 char *secret;
351 CHAPDEBUG((LOG_INFO, "ChapMS: secret is '%.*s'", secret_len, secret));
356 ChapMS_NT(rchallenge, secret, secret_len, &response);
[all …]
H A Dauth.c1073 char secret[MAXWORDLEN]; local
1116 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) {
1121 } else if (secret[0] != '\0') {
1123 if ((!cryptpap && strcmp(passwd, secret) == 0)
1124 || strcmp(crypt(passwd, secret), secret) == 0)
1167 BZERO(secret, sizeof(secret));
1435 char secret[MAXWORDLEN]; local
1447 i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename);
1448 ret = i >= 0 && secret[0] == '\0';
1449 BZERO(secret, sizeof(secret));
[all …]
H A Dchap.c430 char secret[MAXSECRETLEN]; local
502 secret, &secret_len, 0)) {
521 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len);
535 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
541 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len);
550 BZERO(secret, sizeof(secret));
570 char secret[MAXSECRETLEN]; local
637 } else if (!get_secret(cstate->unit, rhn, cstate->chal_name, secret,
651 MD5Update(&mdContext, (u_char *)secret, secret_len);
662 if (ChapMSValidate(cstate, remmd, remmd_len, secret,
[all …]
H A Dchap_ms.h36 char *secret, int secret_len));
38 u_char *response, int response_len, char *secret, int secret_len));
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c108 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, in soft_ssl3_churn() argument
121 SHA1Update(&sha1_ctx, secret, secretlen); in soft_ssl3_churn()
127 MD5Update(&md5_ctx, secret, secretlen); in soft_ssl3_churn()
143 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in soft_tls_prf() argument
153 if (secret == NULL) { in soft_tls_prf()
164 S1 = secret; in soft_tls_prf()
165 S2 = secret + (secretlen / 2); /* Possible overlap of S1 and S2. */ in soft_tls_prf()
216 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, in P_MD5() argument
234 bcopy(secret, md5_ipad, secretlen); in P_MD5()
235 bcopy(secret, md5_opad, secretlen); in P_MD5()
[all …]
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dcheckpw.c114 sasl_secret_t **secret) in _sasl_make_plain_secret() argument
118 sasl_secret_t **secret) in _sasl_make_plain_secret()
125 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + in _sasl_make_plain_secret()
128 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + in _sasl_make_plain_secret()
131 if (*secret == NULL) { in _sasl_make_plain_secret()
139 memcpy((*secret)->data, salt, 16); in _sasl_make_plain_secret()
140 (*secret)->data[16] = '\0'; in _sasl_make_plain_secret()
141 _sasl_MD5Final((*secret)->data + 17, &ctx); in _sasl_make_plain_secret()
142 (*secret)->len = sec_len; in _sasl_make_plain_secret()
/illumos-gate/usr/src/uts/common/inet/sctp/
H A Dsctp_heartbeat.c276 uint64_t secret; in sctp_process_heartbeat() local
287 sizeof (sent) + sizeof (secret) + sizeof (addr))) { in sctp_process_heartbeat()
312 bcopy(++sentp, &secret, sizeof (secret)); in sctp_process_heartbeat()
322 if (secret != fp->sf_hb_secret) { in sctp_process_heartbeat()
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/
H A Dmain.c183 UINT32 secret_len, BYTE *secret) in set_policy_options() argument
189 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret); in set_policy_options()
210 UINT32 secret_len, BYTE *secret) in set_object_policy() argument
221 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret)); in set_object_policy()
H A Dtpmadm.h48 UINT32 secret_len, BYTE *secret);
50 UINT32 secret_len, BYTE *secret);
/illumos-gate/usr/src/pkg/manifests/
H A Dsystem-network.p5m61 dir path=etc/inet/secret group=sys mode=0700
62 file path=etc/inet/secret/ike.preshared group=sys mode=0600 \
63 original_name=SUNWcnetr:etc/inet/secret/ike.preshared preserve=true
64 dir path=etc/inet/secret/ike.privatekeys group=sys mode=0700
65 file path=etc/inet/secret/ipseckeys.sample group=sys mode=0600
66 file path=etc/inet/secret/tcpkeys.sample group=sys mode=0600
/illumos-gate/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c367 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument
369 if(!utils || !secret || !(*secret)) return;
372 utils->erasebuffer((char *)(*secret)->data, (*secret)->len);
374 utils->erasebuffer((*secret)->data, (*secret)->len);
376 utils->free(*secret);
377 *secret = NULL;
/illumos-gate/usr/src/test/os-tests/tests/execvpe/
H A Dexecvpe-script32 if [[ "$EXECVPE_TEST" != "Keep it secret, keep it safe!" ]]; then
33 printf "execvpe wrapper did not set the secret phrase!\n"
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Dgeneric_key.c104 char *secret, /* Private key */ in __generic_gen_dhkeys() argument
159 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys()
H A Ddh_common.h44 char *public, char *secret, char *pass);
/illumos-gate/usr/src/lib/sasl_plugins/cram/
H A Dcram.c556 char secret[65]; in make_hashed() local
564 memcpy(secret, sec->data, sec->len); in make_hashed()
568 secret[lup]='\0'; in make_hashed()
571 memcpy(secret, sec->data, 64); in make_hashed()
576 (unsigned char *) secret, 64, digest); in make_hashed()
/illumos-gate/usr/src/lib/libsasl/include/
H A Dplugin_common.h161 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret);
170 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **secret,

12