Searched refs:secret (Results 1 - 25 of 68) sorted by relevance

123

/freebsd-9.3-release/contrib/opie/libopie/
H A Dpasscheck.c30 Applies "good password" rules to the secret pass phrase.
39 int opiepasscheck FUNCTION((secret), char *secret) argument
41 int len = strlen(secret);
H A Dkeycrunch.c27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND argument
28 struct opie_otpkey *result AND char *seed AND char *secret)
33 if (!result || !seed || !secret)
36 i = strlen(seed) + strlen(secret);
44 while(*c2 = *(secret++)) c2++;
51 strcpy(c2, secret);
H A Dgenerator.c15 Modified by cmetz for OPIE 2.32. If secret=NULL, always return
16 as if opieauto returned "get the secret". Renamed
26 OTP re-init extended responses (same secret) if sequence
136 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response)
162 if (*secret) {
163 if (opiepasscheck(secret))
166 if (i = opiekeycrunch(algorithm, &key, seed, secret))
185 if (opiekeycrunch(algorithm, &newkey, newseed, secret))
238 if (*secret) {
[all...]
/freebsd-9.3-release/contrib/telnet/libtelnet/
H A Dpk.h42 genkeys(char *public, char *secret)
43 common_key(char *secret, char *public, desData *deskey)
46 char secret[HEXKEYBYTES + 1];
55 extern void genkeys(char *public, char *secret);
56 extern void common_key(char *secret, char *public, IdeaData *common,
/freebsd-9.3-release/contrib/wpa/src/eap_common/
H A Dchap.c21 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
29 addr[1] = secret;
H A Dchap.h20 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/freebsd-9.3-release/contrib/opie/
H A Dopiegen.c29 char secret[OPIE_SECRET_MAX+1]; local
62 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) {
63 fputs("Error reading secret pass phrase!\n", stderr);
67 switch (result = opiegenerator(buffer, secret, response)) {
69 fputs("Not a valid OTP secret pass phrase.\n", stderr);
81 memset(secret, 0, sizeof(secret));
86 memset(secret, 0, sizeof(secret));
H A Dopiekey.c4 as command line arguments, prompts for the user's secret pass phrase,
98 static void getsecret FUNCTION((secret, promptextra, retype), char *secret AND char *promptextra AND int flags)
101 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) {
105 if (secret[0] && (flags & 1)) {
112 memset(secret, 0, OPIE_SECRET_MAX + 1);
115 if (verify[0] && strcmp(verify, secret)) {
118 memset(secret, 0, OPIE_SECRET_MAX + 1);
123 if (!(flags & 2) && !aflag && opiepasscheck(secret)) {
124 memset(secret,
138 char secret[OPIE_SECRET_MAX + 1], newsecret[OPIE_SECRET_MAX + 1]; local
[all...]
/freebsd-9.3-release/usr.bin/keylogout/
H A Dkeylogout.c38 * unset the secret key on local machine
50 static char secret[HEXKEYBYTES + 1]; local
62 if (key_setsecret(secret) < 0) {
63 fprintf(stderr, "Could not unset your secret key.\n");
/freebsd-9.3-release/usr.bin/csup/
H A Dcpasswd.sh38 local secret="`md5 -qs "$clientLower:$serverLower:$3"`"
39 _secret="\$md5\$$secret"
101 # Ask for password and generate secret.
107 secret=$_secret
113 if [ "X$secret" = "X$secret2" ]; then
124 echo "$clientName:$secret::"
/freebsd-9.3-release/lib/librpcsvc/
H A Dxcrypt.c54 * Encrypt a secret key given passwd
55 * The secret key is passed and returned in hex notation.
59 xencrypt(char *secret, char *passwd) argument
67 len = strlen(secret) / 2;
72 hex2bin(len, secret, buf);
81 bin2hex(len, (unsigned char *) buf, secret);
87 * Decrypt secret key using passwd
88 * The secret key is passed and returned in hex notation.
92 xdecrypt(char *secret, char *passwd) argument
100 len = strlen(secret) /
[all...]
/freebsd-9.3-release/usr.bin/chkey/
H A Dchkey.c85 char secret[HEXKEYBYTES + 1]; local
158 genkeys(public, secret, pass);
160 memcpy(crypt1, secret, HEXKEYBYTES);
161 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE);
169 || memcmp(crypt2, secret, HEXKEYBYTES) != 0)
202 if (write(fd, secret, strlen(secret)) < 0 ||
209 if (key_setsecret(secret) < 0)
210 errx(1, "unable to login with new secret key");
229 setpublicmap(char *name, char *public, char *secret) argument
[all...]
/freebsd-9.3-release/contrib/bind9/bin/named/
H A Dtsigconf.c47 unsigned char *secret = NULL; local
74 (void)cfg_map_get(key, "secret", &secretobj);
104 secret = isc_mem_get(mctx, secretlen);
105 if (secret == NULL) {
109 isc_buffer_init(&secretbuf, secret, secretlen);
116 ret = dns_tsigkey_create(&keyname, alg, secret, secretlen,
119 isc_mem_put(mctx, secret, secretalloc);
120 secret = NULL;
137 if (secret != NULL)
138 isc_mem_put(mctx, secret, secretallo
[all...]
H A Dcontrolconf.c74 isc_region_t secret; member in struct:controlkey
124 if (key->secret.base != NULL)
125 isc_mem_put(mctx, key->secret.base, key->secret.length);
328 isccc_region_t secret; local
346 secret.rstart = NULL;
367 secret.rstart = isc_mem_get(listener->mctx, key->secret.length);
368 if (secret.rstart == NULL)
370 memmove(secret
717 char secret[1024]; local
811 char secret[1024]; local
[all...]
/freebsd-9.3-release/contrib/ntp/libntp/
H A Dauthkeys.c28 u_char * secret; /* shared secret */ member in struct:savekey
33 size_t secretsize; /* secret octets */
38 #define symkey_payload secret
101 u_char *cache_secret; /* secret */
102 size_t cache_secretsize; /* secret length */
373 * secret must be allocated with a free-compatible allocator. It is
384 u_char * secret,
402 sk->secret = secret;
378 allocsymkey( keyid_t id, u_short flags, u_short type, u_long lifetime, size_t secretsize, u_char * secret, KeyAccT * ka ) argument
657 u_char * secret; local
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/jpake/
H A Djpaketest.c114 BIGNUM *secret = BN_new(); local
145 BN_rand(secret, 32, -1, 0);
148 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
149 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
160 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
161 BN_add_word(secret, 1);
162 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
165 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
172 BN_free(secret);
/freebsd-9.3-release/contrib/bind9/bin/confgen/
H A Dkeygen.h32 const char *keyname, isc_buffer_t *secret,
/freebsd-9.3-release/usr.bin/newkey/
H A Dnewkey.c100 char secret[HEXKEYBYTES + 1]; local
139 genkeys(public, secret, pass);
141 memcpy(crypt1, secret, HEXKEYBYTES);
142 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE);
149 memcmp(crypt2, secret, HEXKEYBYTES) != 0)
182 setpublicmap(char *name, char *public, char *secret) argument
186 (void)sprintf(pkent, "%s:%s", public, secret);
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dsha1-tlsprf.c25 * @secret: Key for PRF
37 int tls_prf(const u8 *secret, size_t secret_len, const char *label, argument
68 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
69 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
74 S1 = secret;
75 S2 = secret + L_S1;
H A Dsha1.h28 int __must_check tls_prf(const u8 *secret, size_t secret_len,
/freebsd-9.3-release/contrib/wpa/src/radius/
H A Dradius.h196 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
198 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
200 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
208 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
211 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
219 const u8 *secret, size_t secret_len);
222 const u8 *secret, size_t secret_len);
225 const u8 *secret, size_t secret_len,
231 const u8 *secret, size_t secret_len);
/freebsd-9.3-release/contrib/bind9/lib/isccc/include/isccc/
H A Dcc.h59 isccc_region_t *secret);
64 isccc_region_t *secret);
/freebsd-9.3-release/usr.sbin/keyserv/
H A Dsetkey.c44 * Store secret keys. Compute common keys,
106 * secret key associated with uid.
120 * secret key associated with uid.
175 MINT *secret; local
202 secret = mp_xtom(xsecret);
204 if ((public == NULL) || (secret == NULL))
208 mp_pow(public, secret, MODULUS, common);
211 mp_mfree(secret);
232 MINT *secret; local
252 secret
493 keybuf secret; member in struct:cachekey_list
[all...]
/freebsd-9.3-release/contrib/bind9/bin/rndc/
H A Drndc.conf35 secret "34f88008d07deabbe65bd01f1d233d47";
46 secret "c3Ryb25nIGVub3VnaCBmb3IgYSBtYW4gYnV0IG1hZGUgZm9yIGEgd29tYW4K";
/freebsd-9.3-release/lib/libradius/
H A Dradlib_private.h67 char *secret; /* Shared secret */ member in struct:rad_server

Completed in 278 milliseconds

123