Searched refs:secret (Results 1 - 25 of 94) sorted by relevance

1234

/freebsd-11-stable/contrib/opie/libopie/
H A Dpasscheck.c30 Applies "good password" rules to the secret pass phrase.
39 int opiepasscheck FUNCTION((secret), char *secret) argument
41 int len = strlen(secret);
H A Dkeycrunch.c27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND argument
28 struct opie_otpkey *result AND char *seed AND char *secret)
33 if (!result || !seed || !secret)
36 i = strlen(seed) + strlen(secret);
44 while(*c2 = *(secret++)) c2++;
51 strcpy(c2, secret);
H A Dgenerator.c15 Modified by cmetz for OPIE 2.32. If secret=NULL, always return
16 as if opieauto returned "get the secret". Renamed
26 OTP re-init extended responses (same secret) if sequence
137 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response)
163 if (*secret) {
164 if (opiepasscheck(secret))
167 if (i = opiekeycrunch(algorithm, &key, seed, secret))
186 if (opiekeycrunch(algorithm, &newkey, newseed, secret))
239 if (*secret) {
[all...]
/freebsd-11-stable/contrib/telnet/libtelnet/
H A Dpk.h42 genkeys(char *public, char *secret)
43 common_key(char *secret, char *public, desData *deskey)
46 char secret[HEXKEYBYTES + 1];
55 extern void genkeys(char *public, char *secret);
56 extern void common_key(char *secret, char *public, IdeaData *common,
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
23 addr[1] = secret;
H A Dchap.h14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
/freebsd-11-stable/contrib/opie/
H A Dopiegen.c29 char secret[OPIE_SECRET_MAX+1]; local
62 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) {
63 fputs("Error reading secret pass phrase!\n", stderr);
67 switch (result = opiegenerator(buffer, secret, response)) {
69 fputs("Not a valid OTP secret pass phrase.\n", stderr);
81 memset(secret, 0, sizeof(secret));
86 memset(secret, 0, sizeof(secret));
H A Dopiekey.c4 as command line arguments, prompts for the user's secret pass phrase,
99 static void getsecret FUNCTION((secret, promptextra, retype), char *secret AND char *promptextra AND int flags)
102 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) {
106 if (secret[0] && (flags & 1)) {
113 memset(secret, 0, OPIE_SECRET_MAX + 1);
116 if (verify[0] && strcmp(verify, secret)) {
119 memset(secret, 0, OPIE_SECRET_MAX + 1);
124 if (!(flags & 2) && !aflag && opiepasscheck(secret)) {
125 memset(secret,
139 char secret[OPIE_SECRET_MAX + 1], newsecret[OPIE_SECRET_MAX + 1]; local
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dsha256-tlsprf.c17 * @secret: Key for PRF
29 int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument
48 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
53 if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0)
58 if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) <
60 hmac_sha256(secret, secret_le
[all...]
H A Dsha256-kdf.c17 * @secret: Key for KDF
32 int hmac_sha256_kdf(const u8 *secret, size_t secret_len, argument
56 if (hmac_sha256_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha256_vector(secret, secret_len, 4, addr, len, T) < 0)
H A Dsha512-kdf.c17 * @secret: Key for KDF
32 int hmac_sha512_kdf(const u8 *secret, size_t secret_len, argument
56 if (hmac_sha512_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha512_vector(secret, secret_len, 4, addr, len, T) < 0)
H A Dsha384-kdf.c17 * @secret: Key for KDF
32 int hmac_sha384_kdf(const u8 *secret, size_t secret_len, argument
56 if (hmac_sha384_vector(secret, secret_len, 3, &addr[1], &len[1], T) < 0)
77 if (hmac_sha384_vector(secret, secret_len, 4, addr, len, T) < 0)
H A Dsha1-tlsprf.c18 * @secret: Key for PRF
30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument
58 * A(0) = seed, A(i) = HMAC(secret, A(i-1))
59 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + ..
64 S1 = secret;
65 S2 = secret + L_S1;
H A Dsha256.h23 int tls_prf_sha256(const u8 *secret, size_t secret_len,
26 int hmac_sha256_kdf(const u8 *secret, size_t secret_len,
/freebsd-11-stable/usr.bin/keylogout/
H A Dkeylogout.c38 * unset the secret key on local machine
50 static char secret[HEXKEYBYTES + 1]; local
62 if (key_setsecret(secret) < 0) {
63 fprintf(stderr, "Could not unset your secret key.\n");
/freebsd-11-stable/lib/librpcsvc/
H A Dxcrypt.c54 * Encrypt a secret key given passwd
55 * The secret key is passed and returned in hex notation.
59 xencrypt(char *secret, char *passwd) argument
67 len = strlen(secret) / 2;
72 hex2bin(len, secret, buf);
81 bin2hex(len, (unsigned char *) buf, secret);
87 * Decrypt secret key using passwd
88 * The secret key is passed and returned in hex notation.
92 xdecrypt(char *secret, char *passwd) argument
100 len = strlen(secret) /
[all...]
/freebsd-11-stable/usr.bin/chkey/
H A Dchkey.c85 char secret[HEXKEYBYTES + 1]; local
162 genkeys(public, secret, pass);
164 memcpy(crypt1, secret, HEXKEYBYTES);
165 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE);
173 || memcmp(crypt2, secret, HEXKEYBYTES) != 0)
206 if (write(fd, secret, strlen(secret)) < 0 ||
213 if (key_setsecret(secret) < 0)
214 errx(1, "unable to login with new secret key");
233 setpublicmap(char *name, char *public, char *secret) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/radius/
H A Dradius.h240 int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
242 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
244 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
247 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
249 void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
252 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
254 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
263 int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
266 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
273 const u8 *secret, size_
[all...]
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcram.c86 unsigned char secret[64];
90 /* Munge the password into a 64-byte secret. */
91 memset(secret, 0, sizeof(secret));
92 if (len <= sizeof(secret))
93 memcpy(secret, password, len);
95 apr_md5(secret, password, len);
97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)),
99 for (i = 0; i < sizeof(secret);
85 unsigned char secret[64]; local
[all...]
/freebsd-11-stable/crypto/openssl/crypto/jpake/
H A Djpaketest.c114 BIGNUM *secret = BN_new(); local
145 BN_rand(secret, 32, -1, 0);
148 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
149 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
160 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret);
161 BN_add_word(secret, 1);
162 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret);
165 fprintf(stderr, "Mismatched secret JPAKE run failed\n");
172 BN_free(secret);
/freebsd-11-stable/usr.bin/newkey/
H A Dnewkey.c100 char secret[HEXKEYBYTES + 1]; local
139 genkeys(public, secret, pass);
141 memcpy(crypt1, secret, HEXKEYBYTES);
142 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE);
149 memcmp(crypt2, secret, HEXKEYBYTES) != 0)
182 setpublicmap(char *name, char *public, char *secret) argument
186 (void)sprintf(pkent, "%s:%s", public, secret);
/freebsd-11-stable/contrib/ntp/libntp/
H A Dauthkeys.c28 u_char * secret; /* shared secret */ member in struct:savekey
33 size_t secretsize; /* secret octets */
38 #define symkey_payload secret
101 u_char *cache_secret; /* secret */
102 size_t cache_secretsize; /* secret length */
473 * secret must be allocated with a free-compatible allocator. It is
484 u_char * secret,
502 sk->secret = secret;
478 allocsymkey( keyid_t id, u_short flags, u_short type, u_long lifetime, size_t secretsize, u_char * secret, KeyAccT * ka ) argument
756 u_char * secret; local
[all...]
/freebsd-11-stable/usr.sbin/keyserv/
H A Dsetkey.c44 * Store secret keys. Compute common keys,
106 * secret key associated with uid.
120 * secret key associated with uid.
175 MINT *secret; local
202 secret = mp_xtom(xsecret);
204 if ((public == NULL) || (secret == NULL))
208 mp_pow(public, secret, MODULUS, common);
211 mp_mfree(secret);
232 MINT *secret; local
252 secret
493 keybuf secret; member in struct:cachekey_list
[all...]
/freebsd-11-stable/usr.sbin/ctld/
H A Dchap.c46 chap_compute_md5(const char id, const char *secret, argument
56 MD5Update(&ctx, secret, strlen(secret));
310 chap_authenticate(struct chap *chap, const char *secret) argument
314 chap_compute_md5(chap->chap_id, secret,
334 rchap_new(const char *secret) argument
342 rchap->rchap_secret = checked_strdup(secret);
/freebsd-11-stable/usr.sbin/iscsid/
H A Dchap.c46 chap_compute_md5(const char id, const char *secret, argument
56 MD5Update(&ctx, secret, strlen(secret));
310 chap_authenticate(struct chap *chap, const char *secret) argument
314 chap_compute_md5(chap->chap_id, secret,
334 rchap_new(const char *secret) argument
342 rchap->rchap_secret = checked_strdup(secret);

Completed in 114 milliseconds

1234