/freebsd-10.0-release/contrib/tcpdump/ |
H A D | print-esp.c | 83 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list 127 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0) 197 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len); 264 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon); 269 if (i < sizeof(sa->secret)) { 270 memcpy(sa->secret, colon, i); 273 memcpy(sa->secret, colon, sizeof(sa->secret)); 274 sa->secretlen = sizeof(sa->secret); 544 u_char *secret; local [all...] |
/freebsd-10.0-release/lib/libradius/ |
H A D | radlib.c | 114 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); 146 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); 162 HMAC_Init(&ctx, srvp->secret, strlen(srvp->secret), EVP_md5()); 217 MD5Update(&ctx, srvp->secret, strlen(srvp->secret)); 240 HMAC_Init(&hctx, srvp->secret, 241 strlen(srvp->secret), EVP_md 381 rad_add_server(struct rad_handle *h, const char *host, int port, const char *secret, int timeout, int tries) argument 392 rad_add_server_ex(struct rad_handle *h, const char *host, int port, const char *secret, int timeout, int tries, int dead_time, struct in_addr *bindto) argument 493 char *secret; local [all...] |
/freebsd-10.0-release/usr.bin/csup/ |
H A D | auth.c | 236 auth_makesecret(struct srvrecord *auth, char *secret) argument 256 memset(secret, 0, MD5_CHARS_MAX); 257 strcpy(secret, md5salt); 258 auth_readablesum(md5sum, secret + strlen(md5salt)); 313 auth_checkresponse(char *response, char *challenge, char *secret) argument 317 auth_makeresponse(challenge, secret, correctresponse);
|
/freebsd-10.0-release/crypto/openssl/crypto/jpake/ |
H A D | jpake.c | 27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX 77 const BIGNUM *secret) 84 ctx->secret = BN_dup(secret); 105 BN_clear_free(ctx->secret); 117 const BIGNUM *secret) 121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret); 360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx); 398 BN_sub(t2, ctx->p.q, ctx->secret); 74 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument 115 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument [all...] |
H A D | jpake.h | 60 const BIGNUM *secret);
|
/freebsd-10.0-release/usr.bin/iscsictl/ |
H A D | iscsictl.c | 428 printf("Mutual secret: %s\n", 487 "[-u user -s secret]\n"); 489 "[-u user -s secret]\n"); 516 *target = NULL, *user = NULL, *secret = NULL; local 555 secret = optarg; 587 if (secret != NULL) 600 if (secret != NULL) 619 if (user != NULL && secret == NULL) 621 if (secret != NULL && user == NULL) 630 if (secret ! [all...] |
/freebsd-10.0-release/usr.sbin/keyserv/ |
H A D | keyserv.c | 44 * Store secret keys per uid. Do public key encryption and decryption 262 * Try to get root's secret key, by prompting if terminal is a tty, else trying 273 char secret[HEXKEYBYTES]; local 279 * Read secret key out of ROOTKEY 286 if (read(fd, secret, HEXKEYBYTES) < HEXKEYBYTES) { 297 memcpy(netstore.st_priv_key, secret, HEXKEYBYTES); 307 * Decrypt yellow pages publickey entry to get secret key 312 if (!getsecretkey(name, secret, passwd)) { 313 warnx("can't find %s's secret key", name); 316 if (secret[ [all...] |
/freebsd-10.0-release/sys/netinet/ |
H A D | tcp_syncache.h | 123 struct syncookie_secret secret; member in struct:tcp_syncache
|
H A D | tcp_syncache.c | 287 callout_init(&V_tcp_syncache.secret.reseed, 1); 288 arc4rand(V_tcp_syncache.secret.key[0], SYNCOOKIE_SECRET_SIZE, 0); 289 arc4rand(V_tcp_syncache.secret.key[1], SYNCOOKIE_SECRET_SIZE, 0); 290 callout_reset(&V_tcp_syncache.secret.reseed, SYNCOOKIE_LIFETIME * hz, 326 callout_drain(&V_tcp_syncache.secret.reseed); 1624 * together with the gloabl secret to make it unique per connection attempt. 1633 * Vector 1: Attacking the secret. This requires finding a weakness in the 1636 * The strength depends on the size and randomness of the secret, and the 1638 * of the secret the attacker has at most 29.999 seconds to find the secret [all...] |
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument 314 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
|
H A D | tlsv1_common.h | 258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
|
/freebsd-10.0-release/lib/libtacplus/ |
H A D | taclib.c | 312 const char *secret; local 319 secret = h->servers[h->cur_server].secret; 320 if (secret[0] == '\0') 329 MD5Update(&base_ctx, secret, strlen(secret)); 765 const char *secret, int timeout, int flags) 789 if ((srvp->secret = xstrdup(h, secret)) == NULL) 805 memset(h->servers[srv].secret, 764 tac_add_server(struct tac_handle *h, const char *host, int port, const char *secret, int timeout, int flags) argument 845 char *secret; local [all...] |
H A D | taclib_private.h | 63 char *secret; /* Shared secret */ member in struct:tac_server
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth2-jpake.c | 267 * Fetch password hashing scheme, password salt and derive shared secret 276 u_char *secret; local 353 &secret, &secret_len) != 0) 355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL) 356 fatal("%s: BN_bin2bn (secret)", __func__); 363 bzero(secret, secret_len); 364 free(secret);
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cyrus_auth.c | 374 sasl_secret_t *secret; local 381 secret = apr_palloc(baton->pool, sizeof(*secret) + len - 1); 382 secret->len = len; 383 memcpy(secret->data, baton->password, len); 385 *psecret = secret;
|
/freebsd-10.0-release/share/examples/ |
H A D | Makefile | 145 ppp/ppp.secret.sample \ 146 ppp/ppp.secret.span-isp \ 147 ppp/ppp.secret.span-isp.working \
|
/freebsd-10.0-release/usr.sbin/ppp/ |
H A D | chap_ms.c | 399 mschap_LANMan(char *digest, char *challenge, char *secret) argument 406 for (ptr = SECRET; *secret && ptr < end; ptr++, secret++) 407 *ptr = toupper(*secret);
|
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | apps.h | 332 void jpake_client_auth(BIO *out, BIO *conn, const char *secret); 333 void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
/freebsd-10.0-release/sbin/spppcontrol/ |
H A D | spppcontrol.c | 134 strncpy(spr.defs.myauth.secret, argv[0] + off, 151 strncpy(spr.defs.hisauth.secret, argv[0] + off, 204 "usage: spppcontrol [-v] ifname [{my|his}auth{proto|name|secret}=...]",
|
/freebsd-10.0-release/usr.sbin/ctld/ |
H A D | ctld.h | 188 const char *user, const char *secret); 190 const char *user, const char *secret,
|
/freebsd-10.0-release/sys/net/ |
H A D | if_sppp.h | 70 u_char secret[AUTHKEYLEN]; /* secret password */ member in struct:sauth
|
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | test_crypto.in | 139 --type=secret \
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | tls_nss.c | 75 struct tls_connection *conn = (struct tls_connection *) fd->secret; 107 struct tls_connection *conn = (struct tls_connection *) fd->secret; 337 conn->fd->secret = (void *) conn; 419 /* NSS does not export master secret or client/server random. */
|
/freebsd-10.0-release/usr.sbin/iscsid/ |
H A D | login.c | 378 login_compute_md5(const char id, const char *secret, argument 389 MD5_Update(&ctx, secret, strlen(secret)); 719 log_errx(1, "mutual CHAP authentication failed: wrong secret"); 898 "have user and secret");
|
/freebsd-10.0-release/tools/regression/geom_eli/ |
H A D | resize.t | 31 echo secret >tmp.key
|