/freebsd-11-stable/contrib/opie/libopie/ |
H A D | passcheck.c | 30 Applies "good password" rules to the secret pass phrase. 39 int opiepasscheck FUNCTION((secret), char *secret) argument 41 int len = strlen(secret);
|
H A D | keycrunch.c | 27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND argument 28 struct opie_otpkey *result AND char *seed AND char *secret) 33 if (!result || !seed || !secret) 36 i = strlen(seed) + strlen(secret); 44 while(*c2 = *(secret++)) c2++; 51 strcpy(c2, secret);
|
H A D | generator.c | 15 Modified by cmetz for OPIE 2.32. If secret=NULL, always return 16 as if opieauto returned "get the secret". Renamed 26 OTP re-init extended responses (same secret) if sequence 137 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response) 163 if (*secret) { 164 if (opiepasscheck(secret)) 167 if (i = opiekeycrunch(algorithm, &key, seed, secret)) 186 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 239 if (*secret) { [all...] |
/freebsd-11-stable/contrib/telnet/libtelnet/ |
H A D | pk.h | 42 genkeys(char *public, char *secret) 43 common_key(char *secret, char *public, desData *deskey) 46 char secret[HEXKEYBYTES + 1]; 55 extern void genkeys(char *public, char *secret); 56 extern void common_key(char *secret, char *public, IdeaData *common,
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/freebsd-11-stable/contrib/opie/ |
H A D | opiegen.c | 29 char secret[OPIE_SECRET_MAX+1]; local 62 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) { 63 fputs("Error reading secret pass phrase!\n", stderr); 67 switch (result = opiegenerator(buffer, secret, response)) { 69 fputs("Not a valid OTP secret pass phrase.\n", stderr); 81 memset(secret, 0, sizeof(secret)); 86 memset(secret, 0, sizeof(secret));
|
H A D | opiekey.c | 4 as command line arguments, prompts for the user's secret pass phrase, 99 static void getsecret FUNCTION((secret, promptextra, retype), char *secret AND char *promptextra AND int flags) 102 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) { 106 if (secret[0] && (flags & 1)) { 113 memset(secret, 0, OPIE_SECRET_MAX + 1); 116 if (verify[0] && strcmp(verify, secret)) { 119 memset(secret, 0, OPIE_SECRET_MAX + 1); 124 if (!(flags & 2) && !aflag && opiepasscheck(secret)) { 125 memset(secret, 139 char secret[OPIE_SECRET_MAX + 1], newsecret[OPIE_SECRET_MAX + 1]; local [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0) 58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) < 60 hmac_sha256(secret, secret_le [all...] |
H A D | sha256-kdf.c | 17 * @secret: Key for KDF 32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument 56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha512-kdf.c | 17 * @secret: Key for KDF 32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, argument 56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha384-kdf.c | 17 * @secret: Key for KDF 32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, argument 56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0) 77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0)
|
H A D | sha1-tlsprf.c | 18 * @secret: Key for PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 58 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 59 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 64 S1 = secret; 65 S2 = secret + L_S1;
|
H A D | sha256.h | 23 int tls_prf_sha256(const u8 *secret, size_t secret_len, 26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
|
/freebsd-11-stable/usr.bin/keylogout/ |
H A D | keylogout.c | 38 * unset the secret key on local machine 50 static char secret[HEXKEYBYTES + 1]; local 62 if (key_setsecret(secret) < 0) { 63 fprintf(stderr, "Could not unset your secret key.\n");
|
/freebsd-11-stable/lib/librpcsvc/ |
H A D | xcrypt.c | 54 * Encrypt a secret key given passwd 55 * The secret key is passed and returned in hex notation. 59 xencrypt(char *secret, char *passwd) argument 67 len = strlen(secret) / 2; 72 hex2bin(len, secret, buf); 81 bin2hex(len, (unsigned char *) buf, secret); 87 * Decrypt secret key using passwd 88 * The secret key is passed and returned in hex notation. 92 xdecrypt(char *secret, char *passwd) argument 100 len = strlen(secret) / [all...] |
/freebsd-11-stable/usr.bin/chkey/ |
H A D | chkey.c | 85 char secret[HEXKEYBYTES + 1]; local 162 genkeys(public, secret, pass); 164 memcpy(crypt1, secret, HEXKEYBYTES); 165 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 173 || memcmp(crypt2, secret, HEXKEYBYTES) != 0) 206 if (write(fd, secret, strlen(secret)) < 0 || 213 if (key_setsecret(secret) < 0) 214 errx(1, "unable to login with new secret key"); 233 setpublicmap(char *name, char *public, char *secret) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius.h | 240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret, 252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 273 const u8 *secret, size_ [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 86 unsigned char secret[64]; 90 /* Munge the password into a 64-byte secret. */ 91 memset(secret, 0, sizeof(secret)); 92 if (len <= sizeof(secret)) 93 memcpy(secret, password, len); 95 apr_md5(secret, password, len); 97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)), 99 for (i = 0; i < sizeof(secret); 85 unsigned char secret[64]; local [all...] |
/freebsd-11-stable/crypto/openssl/crypto/jpake/ |
H A D | jpaketest.c | 114 BIGNUM *secret = BN_new(); local 145 BN_rand(secret, 32, -1, 0); 148 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 149 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 160 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 161 BN_add_word(secret, 1); 162 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 165 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 172 BN_free(secret);
|
/freebsd-11-stable/usr.bin/newkey/ |
H A D | newkey.c | 100 char secret[HEXKEYBYTES + 1]; local 139 genkeys(public, secret, pass); 141 memcpy(crypt1, secret, HEXKEYBYTES); 142 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 149 memcmp(crypt2, secret, HEXKEYBYTES) != 0) 182 setpublicmap(char *name, char *public, char *secret) argument 186 (void)sprintf(pkent, "%s:%s", public, secret);
|
/freebsd-11-stable/contrib/ntp/libntp/ |
H A D | authkeys.c | 28 u_char * secret; /* shared secret */ member in struct:savekey 33 size_t secretsize; /* secret octets */ 38 #define symkey_payload secret 101 u_char *cache_secret; /* secret */ 102 size_t cache_secretsize; /* secret length */ 473 * secret must be allocated with a free-compatible allocator. It is 484 u_char * secret, 502 sk->secret = secret; 478 allocsymkey( keyid_t id, u_short flags, u_short type, u_long lifetime, size_t secretsize, u_char * secret, KeyAccT * ka ) argument 756 u_char * secret; local [all...] |
/freebsd-11-stable/usr.sbin/keyserv/ |
H A D | setkey.c | 44 * Store secret keys. Compute common keys, 106 * secret key associated with uid. 120 * secret key associated with uid. 175 MINT *secret; local 202 secret = mp_xtom(xsecret); 204 if ((public == NULL) || (secret == NULL)) 208 mp_pow(public, secret, MODULUS, common); 211 mp_mfree(secret); 232 MINT *secret; local 252 secret 493 keybuf secret; member in struct:cachekey_list [all...] |
/freebsd-11-stable/usr.sbin/ctld/ |
H A D | chap.c | 46 chap_compute_md5(const char id, const char *secret, argument 56 MD5Update(&ctx, secret, strlen(secret)); 310 chap_authenticate(struct chap *chap, const char *secret) argument 314 chap_compute_md5(chap->chap_id, secret, 334 rchap_new(const char *secret) argument 342 rchap->rchap_secret = checked_strdup(secret);
|
/freebsd-11-stable/usr.sbin/iscsid/ |
H A D | chap.c | 46 chap_compute_md5(const char id, const char *secret, argument 56 MD5Update(&ctx, secret, strlen(secret)); 310 chap_authenticate(struct chap *chap, const char *secret) argument 314 chap_compute_md5(chap->chap_id, secret, 334 rchap_new(const char *secret) argument 342 rchap->rchap_secret = checked_strdup(secret);
|