/illumos-gate/usr/src/lib/libnsl/key/ |
H A D | xcrypt.c | 80 xencrypt(secret, passwd) in xencrypt() argument 81 char *secret; in xencrypt() 90 len = (int)strlen(secret) / 2; 114 xdecrypt(secret, passwd) in xdecrypt() argument 115 char *secret; in xdecrypt() 241 char *secret, /* in */ in xencrypt_g() argument 346 char *secret, /* out */ in xdecrypt_g() argument 391 if (memcmp(secret, &(secret[hexkeybytes]), in xdecrypt_g() 393 secret[0] = 0; in xdecrypt_g() 412 secret[0] = 0; in xdecrypt_g() [all …]
|
H A D | gen_dhkeys.c | 110 __gen_dhkeys(public, secret, pass) in __gen_dhkeys() argument 112 char *secret; 148 (void) adjust(secret, xkey); 269 MINT *secret; in __gen_common_dhkeys_g() local 274 secret = mp_xtom(xsecret); in __gen_common_dhkeys_g() 276 mp_pow(public, secret, MODULUS_192_0, common); in __gen_common_dhkeys_g()
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keylogin.c | 174 fprintf(rootfile, "%s\n", secret); in write_rootkey() 200 fprintf(rootfile, "%s\n", secret); in write_rootkey() 227 char secret[HEXKEYBYTES+1]; in oldkeylogin() local 249 if (secret[0] == 0) { in oldkeylogin() 258 memset(secret, 0, HEXKEYBYTES); in oldkeylogin() 289 static char secret[HEXKEYBYTES + 1]; in logout_curr_key() local 297 if (key_setsecret(secret) < 0) { in logout_curr_key() 324 char secret[4096]; in main() local 368 mechlist[i]->algtype, secret, in main() 378 if (secret[0] == 0) { in main() [all …]
|
H A D | chkey.c | 324 free(secret); in makenewkeys() 326 secret = NULL; in makenewkeys() 349 slist[0] = secret; in makenewkeys() 495 char *secret; in getsecrets() local 514 if (secret[0] == 0) in getsecrets() 532 secret, in getsecrets() 539 free(secret); in getsecrets() 540 secret = NULL; in getsecrets() 567 char *secret = NULL; in getsecrets() local 581 if (secret[0] == 0) { in getsecrets() [all …]
|
H A D | setkey.c | 79 keybuf secret; member 451 cmpkeybuf3(secret, cp->secret)); in cachehit3() 577 keybuf3 *secret; in storeotherrootkeys() local 596 secret->keybuf3_val, secret->keybuf3_len, in storeotherrootkeys() 945 free(secret); in addmasterkey() 1284 MINT *secret; local 1327 mp_mfree(secret); 1384 keybuf3 *secret, in getdeskey3() argument 1449 if ((cp->secret = cpykeybuf3(secret)) == NULL) { in getdeskey3() 1647 MINT *secret; local [all …]
|
H A D | newkey.c | 88 char secret[HEXKEYBYTES + 1]; in main() local 211 (void) __gen_dhkeys(public, secret, short_pass); in main() 213 (void) memcpy(crypt1, secret, HEXKEYBYTES); in main() 214 (void) memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); in main() 246 setpublicmap(name, public, secret, database, pw) in setpublicmap() argument 250 char *secret; 258 (void) sprintf(pkent, "%s:%s", public, secret); 292 return (ldap_update("dh192-0", name, public, secret, pw));
|
H A D | keyserv_cache.c | 56 struct dhkey secret; member 113 keybuf3 *secret); 856 keybuf3 *secret) in cache_insert_ch() argument 873 (sk = keybuf3_2_dhkey(secret)) == 0) { in cache_insert_ch() 896 memcpy(&(skck->secret), sk, DHKEYSIZE(sk)); in cache_insert_ch() 962 cl->secret->keybuf3_val = MOVE_ADDR(cl->secret, sizeof (keybuf3)); in copy_cl_item() 964 MOVE_ADDR(cl->secret->keybuf3_val, in copy_cl_item() 970 bin2hex(skck->secret.key, (u_char *)cl->secret->keybuf3_val, in copy_cl_item() 971 skck->secret.length); in copy_cl_item() 972 cl->secret->keybuf3_len = skck->secret.length*2+1; in copy_cl_item() [all …]
|
H A D | keylogout.c | 57 static char secret[HEXKEYBYTES + 1]; in main() local 76 if (key_setsecret(secret) < 0) { in main()
|
H A D | keyserv_cache.h | 60 keybuf3 *secret; member 78 keybuf3 *secret);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | chap_ms.c | 281 char *secret; 300 unicodePassword[i * 2] = (u_char)secret[i]; 316 char *secret; 328 islower(secret[i]) ? toupper(secret[i]) : secret[i]); 340 char *secret; 391 char *secret; 448 char *secret; 486 char *secret; 515 char *rhostname, *secret; 601 char *secret; [all …]
|
H A D | auth.c | 1073 char secret[MAXWORDLEN]; local 1124 || strcmp(crypt(passwd, secret), secret) == 0) 1167 BZERO(secret, sizeof(secret)); 1435 char secret[MAXWORDLEN]; local 1449 BZERO(secret, sizeof(secret)); 1476 char secret[MAXWORDLEN]; local 1500 BZERO(secret, sizeof(secret)); 1602 char *secret; 1931 char *secret; 2036 if (secret != NULL) [all …]
|
H A D | chap.c | 430 char secret[MAXSECRETLEN]; local 502 secret, &secret_len, 0)) { 521 MD5Update(&mdContext, (u_char *)secret, (unsigned)secret_len); 535 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len); 541 ChapMSv2(cstate, rchallenge, rchallenge_len, secret, secret_len); 550 BZERO(secret, sizeof(secret)); 570 char secret[MAXSECRETLEN]; local 651 MD5Update(&mdContext, (u_char *)secret, secret_len); 662 if (ChapMSValidate(cstate, remmd, remmd_len, secret, 671 secret, secret_len)) [all …]
|
H A D | chap_ms.h | 36 char *secret, int secret_len)); 38 u_char *response, int response_len, char *secret, int secret_len));
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 121 SHA1Update(&sha1_ctx, secret, secretlen); in soft_ssl3_churn() 127 MD5Update(&md5_ctx, secret, secretlen); in soft_ssl3_churn() 153 if (secret == NULL) { in soft_tls_prf() 164 S1 = secret; in soft_tls_prf() 234 bcopy(secret, md5_ipad, secretlen); in P_MD5() 235 bcopy(secret, md5_opad, secretlen); in P_MD5() 314 bcopy(secret, sha1_ipad, secretlen); in P_SHA1() 315 bcopy(secret, sha1_opad, secretlen); in P_SHA1() 1070 MD5Update(&exp_md5_ctx, secret, secretlen); in soft_ssl_weaken_key() 1078 soft_tls_prf(secret, secretlen, label, labellen, in soft_ssl_weaken_key() [all …]
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 114 sasl_secret_t **secret) in _sasl_make_plain_secret() argument 118 sasl_secret_t **secret) in _sasl_make_plain_secret() 125 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + in _sasl_make_plain_secret() 128 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + in _sasl_make_plain_secret() 131 if (*secret == NULL) { in _sasl_make_plain_secret() 139 memcpy((*secret)->data, salt, 16); in _sasl_make_plain_secret() 140 (*secret)->data[16] = '\0'; in _sasl_make_plain_secret() 141 _sasl_MD5Final((*secret)->data + 17, &ctx); in _sasl_make_plain_secret() 142 (*secret)->len = sec_len; in _sasl_make_plain_secret()
|
/illumos-gate/usr/src/uts/common/inet/sctp/ |
H A D | sctp_heartbeat.c | 276 uint64_t secret; in sctp_process_heartbeat() local 287 sizeof (sent) + sizeof (secret) + sizeof (addr))) { in sctp_process_heartbeat() 312 bcopy(++sentp, &secret, sizeof (secret)); in sctp_process_heartbeat() 322 if (secret != fp->sf_hb_secret) { in sctp_process_heartbeat()
|
/illumos-gate/usr/src/cmd/cmd-crypto/tpmadm/ |
H A D | main.c | 183 UINT32 secret_len, BYTE *secret) in set_policy_options() argument 189 ret = Tspi_Policy_SetSecret(hPolicy, mode, secret_len, secret); in set_policy_options() 210 UINT32 secret_len, BYTE *secret) in set_object_policy() argument 221 return (set_policy_options(hPolicy, mode, prompt, secret_len, secret)); in set_object_policy()
|
H A D | tpmadm.h | 48 UINT32 secret_len, BYTE *secret); 50 UINT32 secret_len, BYTE *secret);
|
/illumos-gate/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 367 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 369 if(!utils || !secret || !(*secret)) return; 372 utils->erasebuffer((char *)(*secret)->data, (*secret)->len); 374 utils->erasebuffer((*secret)->data, (*secret)->len); 376 utils->free(*secret); 377 *secret = NULL;
|
/illumos-gate/usr/src/pkg/manifests/ |
H A D | system-network.p5m | 60 dir path=etc/inet/secret group=sys mode=0700 61 file path=etc/inet/secret/ike.preshared group=sys mode=0600 \ 62 original_name=SUNWcnetr:etc/inet/secret/ike.preshared preserve=true 63 dir path=etc/inet/secret/ike.privatekeys group=sys mode=0700 64 file path=etc/inet/secret/ipseckeys.sample group=sys mode=0600
|
/illumos-gate/usr/src/test/os-tests/tests/execvpe/ |
H A D | execvpe-script | 32 if [[ "$EXECVPE_TEST" != "Keep it secret, keep it safe!" ]]; then 33 printf "execvpe wrapper did not set the secret phrase!\n"
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 104 char *secret, /* Private key */ in __generic_gen_dhkeys() argument 159 (void) adjust(secret, xkey, keylen); in __generic_gen_dhkeys()
|
H A D | dh_common.h | 44 char *public, char *secret, char *pass);
|
/illumos-gate/usr/src/lib/sasl_plugins/cram/ |
H A D | cram.c | 556 char secret[65]; in make_hashed() local 564 memcpy(secret, sec->data, sec->len); in make_hashed() 568 secret[lup]='\0'; in make_hashed() 571 memcpy(secret, sec->data, 64); in make_hashed() 576 (unsigned char *) secret, 64, digest); in make_hashed()
|
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | plugin_common.h | 161 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret); 170 int _plug_get_password(const sasl_utils_t *utils, sasl_secret_t **secret,
|