Searched refs:secret (Results 1 - 25 of 33) sorted by relevance

12

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/plugins/radius/
H A Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument
[all...]
H A Dconfig.c450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument
492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */
495 memset (secret, '\0', MAX_SECRET_LENGTH);
501 strncpy (secret, s, (size_t) len);
502 secret[MAX_SECRET_LENGTH] = '\0';
538 memset (secret, '\0', sizeof (secret));
H A Dradius.c200 * 1 -- we are ALWAYS willing to supply a secret. :-)
344 /* Need the RADIUS secret and Request Authenticator to decode MPPE */
739 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
747 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
803 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
818 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
[all...]
H A Dradiusclient.h358 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
70 /* Generate hash of ID, secret, challenge */
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
H A Dchap_ms.c190 unsigned char *secret, int secret_len,
212 ChapMS(challenge, (char *)secret, secret_len, md);
238 unsigned char *secret, int secret_len,
253 (char *)secret, secret_len, md,
315 unsigned char *challenge, char *secret, int secret_len,
320 ChapMS(challenge, secret, secret_len, response);
325 unsigned char *challenge, char *secret, int secret_len,
336 our_name, secret, secret_len, response, private,
510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
523 MD4Update(&md4Context, secret, 51
189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
[all...]
H A Dauth.c793 error("No secret found for PAP login");
1295 "but I couldn't find any suitable secret (password) for it to use to do so.");
1379 char secret[MAXWORDLEN]; local
1411 * Open the file of pap secrets and scan for a suitable secret
1424 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1425 warn("no PAP secret found for %s", user);
1428 * If the secret is "@login", it means to check
1431 int login_secret = strcmp(secret, "@login") == 0;
1434 /* login option or secret is @login */
1438 if (secret[
1720 char secret[MAXWORDLEN]; local
1771 char secret[MAXWORDLEN]; local
[all...]
H A Dchap-new.c398 unsigned char secret[MAXSECRETLEN]; local
401 /* Get the secret that the peer is supposed to know */
402 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
403 error("No CHAP secret found for authenticating %q", name);
407 ok = digest->verify_response(id, name, secret, secret_len, challenge,
409 memset(secret, 0, sizeof(secret));
426 char secret[MAXSECRETLEN+1]; local
442 /* get secret for authenticating ourselves with the specified host */
443 if (!get_secret(0, cs->name, rname, secret,
[all...]
H A Deap.c83 static char *pn_secret = NULL; /* Pseudonym generating secret */
103 { "srp-pn-secret", o_string, &pn_secret,
104 "Long term pseudonym generation secret" },
312 * Set DES key according to pseudonym-generating secret and current
1319 char secret[MAXWORDLEN]; local
1439 * Get the secret for authenticating ourselves with
1443 rhostname, secret, &secret_len, 0)) {
1444 dbglog("EAP: no MD5 secret for auth to %q", rhostname);
1451 MD5_Update(&mdContext, secret, secret_len);
1452 BZERO(secret, sizeo
1729 char secret[MAXSECRETLEN]; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/l2tpd-0.69/
H A Daaa.h39 unsigned char secret[MAXSTRLEN]; /* The shared secret */ member in struct:challenge
H A Daaa.c136 int get_secret (char *us, char *them, char *secret, int size) argument
197 "%s: Invalid authentication info (no secret), line %d\n",
206 "%s: we are '%s', they are '%s', secret is '%s'\n",
209 strncpy (secret, s, size);
252 if (!get_secret (us, them, chal->secret, sizeof (chal->secret)))
254 log (LOG_DEBUG, "%s: no secret found for us='%s' and them='%s'\n",
263 log (LOG_DEBUG, "%s: Here comes the secret\n", __FUNCTION__);
264 bufferDump (chal->secret, strlen (chal->secret));
[all...]
H A Dl2tp.h150 char secret[MAXSTRLEN]; /* Secret to use */ member in struct:tunnel
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/
H A Dchap_ms.c227 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_len, response)
230 char *secret;
245 /* Initialize the Unicode version of the secret (== password). */
249 unicodePassword[i * 2] = (u_char)secret[i];
263 ChapMS_LANMan(rchallenge, rchallenge_len, secret, secret_len, response)
266 char *secret;
277 UcasePassword[i] = (u_char)toupper(secret[i]);
285 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len)
289 char *secret;
297 ChapMS_NT(rchallenge, rchallenge_len, secret, secret_le
[all...]
H A Dauth.c491 error("No secret found for PAP login");
855 "but I couldn't find any suitable secret (password) for it to use to do so.");
916 char secret[MAXWORDLEN]; local
944 * Open the file of pap secrets and scan for a suitable secret
956 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) {
957 warn("no PAP secret found for %s", user);
960 /* Check PAP-secret file only, don't check login database! */
964 * If the secret is "@login", it means to check
967 int login_secret = strcmp(secret, "@login") == 0;
970 /* login option or secret i
1258 char secret[MAXWORDLEN]; local
1299 char secret[MAXWORDLEN]; local
[all...]
H A Dchap.c408 char secret[MAXSECRETLEN]; local
445 /* get secret for authenticating ourselves with the specified host */
447 secret, &secret_len, 0)) {
448 secret_len = 0; /* assume null secret if can't find one */
449 warn("No CHAP secret found for authenticating us to %q", rhostname);
465 MD5Update(&mdContext, secret, secret_len);
474 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
483 BZERO(secret, sizeof(secret));
503 char secret[MAXSECRETLE local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/lib/
H A Dsmbrun.c186 sends the provided secret to the child stdin.
189 int smbrunsecret(char *cmd, char *secret) argument
230 /* send the secret */
231 write(ifd[1], secret, strlen(secret));
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/shared/
H A Dwlif_utils.h57 char *secret; /* user-supplied radius secret */ member in struct:wsec_info_s
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/char/
H A Drandom.c1269 * generator to pick an initial secret value. This value is hashed
1277 * compensated for by changing the secret periodically.
1386 __u32 secret[12]; member in struct:keydata
1411 get_random_bytes(keyptr->secret, sizeof(keyptr->secret));
1448 memcpy(&hash[5],keyptr->secret,sizeof(__u32) * 7);
1476 hash[1] = keyptr->secret[9];
1477 hash[2] = keyptr->secret[10];
1478 hash[3] = keyptr->secret[11];
1480 return half_md4_transform(hash, keyptr->secret);
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/tests/certs/scripts/
H A Dgenroot.sh44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret
47 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
H A Dgenserv.sh71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret
75 $OPENSSL rsa -in $PREFIX-sv.key -out $PREFIX-sv.key -passin pass:secret
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppoecd/
H A Dauth.c154 error("No secret found for PAP login");
429 * get_secret - open the CHAP secret file and return the secret
434 get_secret(unit, client, server, secret, secret_len, am_server)
438 char *secret;
443 BCOPY(passwd, secret, *secret_len);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dpubkey.c232 static const char *secret; local
237 case 0: secret = sample_private_key_1; break;
238 case 1: secret = sample_private_key_1_1; break;
239 case 2: secret = sample_private_key_1_2; break;
246 rc = gcry_sexp_sscan (&sec_key, NULL, secret, strlen (secret));
327 ? "(genkey (elg (nbits 4:1024)(xvalue my.not-so-secret.key)))"
843 die ("parameter d not found in RSA secret key [%d]\n", what);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Drsa.c91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
119 /* Decrypt using the secret key. */
120 secret (decr_plaintext, ciphertext, sk);
129 /* Use the RSA secret function to create a signature of the plaintext. */
130 secret (signature, plaintext, sk);
237 /* select two (very secret) primes */
282 /* calculate the secret key d = e^1 mod phi */
541 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */
586 * Test whether the secret key is valid.
678 log_info ( "RSA secret ke
703 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function
[all...]
H A Dprimegen.c34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel,
291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret.
755 gen_prime (unsigned int nbits, int secret, int randomlevel,
774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits );
787 generating a secret prime we are most probably doing that
791 if (secret)
825 if (!mpi_test_bit( ptest, nbits-1-secret ))
753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument

Completed in 203 milliseconds

12