/freebsd-9.3-release/contrib/opie/libopie/ |
H A D | passcheck.c | 30 Applies "good password" rules to the secret pass phrase. 39 int opiepasscheck FUNCTION((secret), char *secret) argument 41 int len = strlen(secret);
|
H A D | keycrunch.c | 27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND argument 28 struct opie_otpkey *result AND char *seed AND char *secret) 33 if (!result || !seed || !secret) 36 i = strlen(seed) + strlen(secret); 44 while(*c2 = *(secret++)) c2++; 51 strcpy(c2, secret);
|
H A D | generator.c | 15 Modified by cmetz for OPIE 2.32. If secret=NULL, always return 16 as if opieauto returned "get the secret". Renamed 26 OTP re-init extended responses (same secret) if sequence 136 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response) 162 if (*secret) { 163 if (opiepasscheck(secret)) 166 if (i = opiekeycrunch(algorithm, &key, seed, secret)) 185 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 238 if (*secret) { [all...] |
/freebsd-9.3-release/contrib/telnet/libtelnet/ |
H A D | pk.h | 42 genkeys(char *public, char *secret) 43 common_key(char *secret, char *public, desData *deskey) 46 char secret[HEXKEYBYTES + 1]; 55 extern void genkeys(char *public, char *secret); 56 extern void common_key(char *secret, char *public, IdeaData *common,
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | chap.c | 21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 29 addr[1] = secret;
|
H A D | chap.h | 20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/freebsd-9.3-release/contrib/opie/ |
H A D | opiegen.c | 29 char secret[OPIE_SECRET_MAX+1]; local 62 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) { 63 fputs("Error reading secret pass phrase!\n", stderr); 67 switch (result = opiegenerator(buffer, secret, response)) { 69 fputs("Not a valid OTP secret pass phrase.\n", stderr); 81 memset(secret, 0, sizeof(secret)); 86 memset(secret, 0, sizeof(secret));
|
H A D | opiekey.c | 4 as command line arguments, prompts for the user's secret pass phrase, 98 static void getsecret FUNCTION((secret, promptextra, retype), char *secret AND char *promptextra AND int flags) 101 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) { 105 if (secret[0] && (flags & 1)) { 112 memset(secret, 0, OPIE_SECRET_MAX + 1); 115 if (verify[0] && strcmp(verify, secret)) { 118 memset(secret, 0, OPIE_SECRET_MAX + 1); 123 if (!(flags & 2) && !aflag && opiepasscheck(secret)) { 124 memset(secret, 138 char secret[OPIE_SECRET_MAX + 1], newsecret[OPIE_SECRET_MAX + 1]; local [all...] |
/freebsd-9.3-release/usr.bin/keylogout/ |
H A D | keylogout.c | 38 * unset the secret key on local machine 50 static char secret[HEXKEYBYTES + 1]; local 62 if (key_setsecret(secret) < 0) { 63 fprintf(stderr, "Could not unset your secret key.\n");
|
/freebsd-9.3-release/usr.bin/csup/ |
H A D | cpasswd.sh | 38 local secret="`md5 -qs "$clientLower:$serverLower:$3"`" 39 _secret="\$md5\$$secret" 101 # Ask for password and generate secret. 107 secret=$_secret 113 if [ "X$secret" = "X$secret2" ]; then 124 echo "$clientName:$secret::"
|
/freebsd-9.3-release/lib/librpcsvc/ |
H A D | xcrypt.c | 54 * Encrypt a secret key given passwd 55 * The secret key is passed and returned in hex notation. 59 xencrypt(char *secret, char *passwd) argument 67 len = strlen(secret) / 2; 72 hex2bin(len, secret, buf); 81 bin2hex(len, (unsigned char *) buf, secret); 87 * Decrypt secret key using passwd 88 * The secret key is passed and returned in hex notation. 92 xdecrypt(char *secret, char *passwd) argument 100 len = strlen(secret) / [all...] |
/freebsd-9.3-release/usr.bin/chkey/ |
H A D | chkey.c | 85 char secret[HEXKEYBYTES + 1]; local 158 genkeys(public, secret, pass); 160 memcpy(crypt1, secret, HEXKEYBYTES); 161 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 169 || memcmp(crypt2, secret, HEXKEYBYTES) != 0) 202 if (write(fd, secret, strlen(secret)) < 0 || 209 if (key_setsecret(secret) < 0) 210 errx(1, "unable to login with new secret key"); 229 setpublicmap(char *name, char *public, char *secret) argument [all...] |
/freebsd-9.3-release/contrib/bind9/bin/named/ |
H A D | tsigconf.c | 47 unsigned char *secret = NULL; local 74 (void)cfg_map_get(key, "secret", &secretobj); 104 secret = isc_mem_get(mctx, secretlen); 105 if (secret == NULL) { 109 isc_buffer_init(&secretbuf, secret, secretlen); 116 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen, 119 isc_mem_put(mctx, secret, secretalloc); 120 secret = NULL; 137 if (secret != NULL) 138 isc_mem_put(mctx, secret, secretallo [all...] |
H A D | controlconf.c | 74 isc_region_t secret; member in struct:controlkey 124 if (key->secret.base != NULL) 125 isc_mem_put(mctx, key->secret.base, key->secret.length); 328 isccc_region_t secret; local 346 secret.rstart = NULL; 367 secret.rstart = isc_mem_get(listener->mctx, key->secret.length); 368 if (secret.rstart == NULL) 370 memmove(secret 717 char secret[1024]; local 811 char secret[1024]; local [all...] |
/freebsd-9.3-release/contrib/ntp/libntp/ |
H A D | authkeys.c | 28 u_char * secret; /* shared secret */ member in struct:savekey 33 size_t secretsize; /* secret octets */ 38 #define symkey_payload secret 101 u_char *cache_secret; /* secret */ 102 size_t cache_secretsize; /* secret length */ 373 * secret must be allocated with a free-compatible allocator. It is 384 u_char * secret, 402 sk->secret = secret; 378 allocsymkey( keyid_t id, u_short flags, u_short type, u_long lifetime, size_t secretsize, u_char * secret, KeyAccT * ka ) argument 657 u_char * secret; local [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/jpake/ |
H A D | jpaketest.c | 114 BIGNUM *secret = BN_new(); local 145 BN_rand(secret, 32, -1, 0); 148 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 149 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 160 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 161 BN_add_word(secret, 1); 162 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 165 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 172 BN_free(secret);
|
/freebsd-9.3-release/contrib/bind9/bin/confgen/ |
H A D | keygen.h | 32 const char *keyname, isc_buffer_t *secret,
|
/freebsd-9.3-release/usr.bin/newkey/ |
H A D | newkey.c | 100 char secret[HEXKEYBYTES + 1]; local 139 genkeys(public, secret, pass); 141 memcpy(crypt1, secret, HEXKEYBYTES); 142 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 149 memcmp(crypt2, secret, HEXKEYBYTES) != 0) 182 setpublicmap(char *name, char *public, char *secret) argument 186 (void)sprintf(pkent, "%s:%s", public, secret);
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | sha1-tlsprf.c | 25 * @secret: Key for PRF 37 int tls_prf(const u8 *secret, size_t secret_len, const char *label, argument 68 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 69 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 74 S1 = secret; 75 S2 = secret + L_S1;
|
H A D | sha1.h | 28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
|
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius.h | 196 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 198 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 200 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 208 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 211 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 219 const u8 *secret, size_t secret_len); 222 const u8 *secret, size_t secret_len); 225 const u8 *secret, size_t secret_len, 231 const u8 *secret, size_t secret_len);
|
/freebsd-9.3-release/contrib/bind9/lib/isccc/include/isccc/ |
H A D | cc.h | 59 isccc_region_t *secret); 64 isccc_region_t *secret);
|
/freebsd-9.3-release/usr.sbin/keyserv/ |
H A D | setkey.c | 44 * Store secret keys. Compute common keys, 106 * secret key associated with uid. 120 * secret key associated with uid. 175 MINT *secret; local 202 secret = mp_xtom(xsecret); 204 if ((public == NULL) || (secret == NULL)) 208 mp_pow(public, secret, MODULUS, common); 211 mp_mfree(secret); 232 MINT *secret; local 252 secret 493 keybuf secret; member in struct:cachekey_list [all...] |
/freebsd-9.3-release/contrib/bind9/bin/rndc/ |
H A D | rndc.conf | 35 secret "34f88008d07deabbe65bd01f1d233d47"; 46 secret "c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K";
|
/freebsd-9.3-release/lib/libradius/ |
H A D | radlib_private.h | 67 char *secret; /* Shared secret */ member in struct:rad_server
|