Searched refs:secret (Results 26 - 50 of 66) sorted by relevance

123

/freebsd-10.0-release/contrib/tcpdump/
H A Dprint-esp.c83 u_char secret[256]; /* is that big enough for all secrets? */ member in struct:sa_list
127 if (EVP_CipherInit(&ctx, sa->evp, sa->secret, NULL, 0) < 0)
197 (*ndo->ndo_warning)(ndo, "secret is too big: %d\n", len);
264 sa->secretlen = espprint_decode_hex(ndo, sa->secret, sizeof(sa->secret), colon);
269 if (i < sizeof(sa->secret)) {
270 memcpy(sa->secret, colon, i);
273 memcpy(sa->secret, colon, sizeof(sa->secret));
274 sa->secretlen = sizeof(sa->secret);
544 u_char *secret; local
[all...]
/freebsd-10.0-release/lib/libradius/
H A Dradlib.c114 MD5Update(&ctx, srvp->secret, strlen(srvp->secret));
146 MD5Update(&ctx, srvp->secret, strlen(srvp->secret));
162 HMAC_Init(&ctx, srvp->secret, strlen(srvp->secret), EVP_md5());
217 MD5Update(&ctx, srvp->secret, strlen(srvp->secret));
240 HMAC_Init(&hctx, srvp->secret,
241 strlen(srvp->secret), EVP_md
381 rad_add_server(struct rad_handle *h, const char *host, int port, const char *secret, int timeout, int tries) argument
392 rad_add_server_ex(struct rad_handle *h, const char *host, int port, const char *secret, int timeout, int tries, int dead_time, struct in_addr *bindto) argument
493 char *secret; local
[all...]
/freebsd-10.0-release/usr.bin/csup/
H A Dauth.c236 auth_makesecret(struct srvrecord *auth, char *secret) argument
256 memset(secret, 0, MD5_CHARS_MAX);
257 strcpy(secret, md5salt);
258 auth_readablesum(md5sum, secret + strlen(md5salt));
313 auth_checkresponse(char *response, char *challenge, char *secret) argument
317 auth_makeresponse(challenge, secret, correctresponse);
/freebsd-10.0-release/crypto/openssl/crypto/jpake/
H A Djpake.c27 BIGNUM *secret; /* The shared secret */ member in struct:JPAKE_CTX
77 const BIGNUM *secret)
84 ctx->secret = BN_dup(secret);
105 BN_clear_free(ctx->secret);
117 const BIGNUM *secret)
121 JPAKE_CTX_init(ctx, name, peer_name, p, g, q, secret);
360 BN_mod_mul(t2, ctx->xb, ctx->secret, ctx->p.q, ctx->ctx);
398 BN_sub(t2, ctx->p.q, ctx->secret);
74 JPAKE_CTX_init(JPAKE_CTX *ctx, const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
115 JPAKE_CTX_new(const char *name, const char *peer_name, const BIGNUM *p, const BIGNUM *g, const BIGNUM *q, const BIGNUM *secret) argument
[all...]
H A Djpake.h60 const BIGNUM *secret);
/freebsd-10.0-release/usr.bin/iscsictl/
H A Discsictl.c428 printf("Mutual secret: %s\n",
487 "[-u user -s secret]\n");
489 "[-u user -s secret]\n");
516 *target = NULL, *user = NULL, *secret = NULL; local
555 secret = optarg;
587 if (secret != NULL)
600 if (secret != NULL)
619 if (user != NULL && secret == NULL)
621 if (secret != NULL && user == NULL)
630 if (secret !
[all...]
/freebsd-10.0-release/usr.sbin/keyserv/
H A Dkeyserv.c44 * Store secret keys per uid. Do public key encryption and decryption
262 * Try to get root's secret key, by prompting if terminal is a tty, else trying
273 char secret[HEXKEYBYTES]; local
279 * Read secret key out of ROOTKEY
286 if (read(fd, secret, HEXKEYBYTES) < HEXKEYBYTES) {
297 memcpy(netstore.st_priv_key, secret, HEXKEYBYTES);
307 * Decrypt yellow pages publickey entry to get secret key
312 if (!getsecretkey(name, secret, passwd)) {
313 warnx("can't find %s's secret key", name);
316 if (secret[
[all...]
/freebsd-10.0-release/sys/netinet/
H A Dtcp_syncache.h123 struct syncookie_secret secret; member in struct:tcp_syncache
H A Dtcp_syncache.c287 callout_init(&V_tcp_syncache.secret.reseed, 1);
288 arc4rand(V_tcp_syncache.secret.key[0], SYNCOOKIE_SECRET_SIZE, 0);
289 arc4rand(V_tcp_syncache.secret.key[1], SYNCOOKIE_SECRET_SIZE, 0);
290 callout_reset(&V_tcp_syncache.secret.reseed, SYNCOOKIE_LIFETIME * hz,
326 callout_drain(&V_tcp_syncache.secret.reseed);
1624 * together with the gloabl secret to make it unique per connection attempt.
1633 * Vector 1: Attacking the secret. This requires finding a weakness in the
1636 * The strength depends on the size and randomness of the secret, and the
1638 * of the secret the attacker has at most 29.999 seconds to find the secret
[all...]
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dtlsv1_common.c309 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, argument
314 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
320 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
H A Dtlsv1_common.h258 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
/freebsd-10.0-release/lib/libtacplus/
H A Dtaclib.c312 const char *secret; local
319 secret = h->servers[h->cur_server].secret;
320 if (secret[0] == '\0')
329 MD5Update(&base_ctx, secret, strlen(secret));
765 const char *secret, int timeout, int flags)
789 if ((srvp->secret = xstrdup(h, secret)) == NULL)
805 memset(h->servers[srv].secret,
764 tac_add_server(struct tac_handle *h, const char *host, int port, const char *secret, int timeout, int flags) argument
845 char *secret; local
[all...]
H A Dtaclib_private.h63 char *secret; /* Shared secret */ member in struct:tac_server
/freebsd-10.0-release/crypto/openssh/
H A Dauth2-jpake.c267 * Fetch password hashing scheme, password salt and derive shared secret
276 u_char *secret; local
353 &secret, &secret_len) != 0)
355 if ((*s = BN_bin2bn(secret, secret_len, NULL)) == NULL)
356 fatal("%s: BN_bin2bn (secret)", __func__);
363 bzero(secret, secret_len);
364 free(secret);
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcyrus_auth.c374 sasl_secret_t *secret; local
381 secret = apr_palloc(baton->pool, sizeof(*secret) + len - 1);
382 secret->len = len;
383 memcpy(secret->data, baton->password, len);
385 *psecret = secret;
/freebsd-10.0-release/share/examples/
H A DMakefile145 ppp/ppp.secret.sample \
146 ppp/ppp.secret.span-isp \
147 ppp/ppp.secret.span-isp.working \
/freebsd-10.0-release/usr.sbin/ppp/
H A Dchap_ms.c399 mschap_LANMan(char *digest, char *challenge, char *secret) argument
406 for (ptr = SECRET; *secret && ptr < end; ptr++, secret++)
407 *ptr = toupper(*secret);
/freebsd-10.0-release/crypto/openssl/apps/
H A Dapps.h332 void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
333 void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
/freebsd-10.0-release/sbin/spppcontrol/
H A Dspppcontrol.c134 strncpy(spr.defs.myauth.secret, argv[0] + off,
151 strncpy(spr.defs.hisauth.secret, argv[0] + off,
204 "usage: spppcontrol [-v] ifname [{my|his}auth{proto|name|secret}=...]",
/freebsd-10.0-release/usr.sbin/ctld/
H A Dctld.h188 const char *user, const char *secret);
190 const char *user, const char *secret,
/freebsd-10.0-release/sys/net/
H A Dif_sppp.h70 u_char secret[AUTHKEYLEN]; /* secret password */ member in struct:sauth
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dtest_crypto.in139 --type=secret \
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dtls_nss.c75 struct tls_connection *conn = (struct tls_connection *) fd->secret;
107 struct tls_connection *conn = (struct tls_connection *) fd->secret;
337 conn->fd->secret = (void *) conn;
419 /* NSS does not export master secret or client/server random. */
/freebsd-10.0-release/usr.sbin/iscsid/
H A Dlogin.c378 login_compute_md5(const char id, const char *secret, argument
389 MD5_Update(&ctx, secret, strlen(secret));
719 log_errx(1, "mutual CHAP authentication failed: wrong secret");
898 "have user and secret");
/freebsd-10.0-release/tools/regression/geom_eli/
H A Dresize.t31 echo secret >tmp.key

Completed in 167 milliseconds

123