Searched refs:secret (Results 1 - 25 of 29) sorted by path

12

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/tests/certs/scripts/
H A Dgenroot.sh44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret
47 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
H A Dgenserv.sh71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret
75 $OPENSSL rsa -in $PREFIX-sv.key -out $PREFIX-sv.key -passin pass:secret
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/
H A Daaa.c136 int get_secret (char *us, char *them, char *secret, int size) argument
197 "%s: Invalid authentication info (no secret), line %d\n",
206 "%s: we are '%s', they are '%s', secret is '%s'\n",
209 strncpy (secret, s, size);
252 if (!get_secret (us, them, chal->secret, sizeof (chal->secret)))
254 log (LOG_DEBUG, "%s: no secret found for us='%s' and them='%s'\n",
263 log (LOG_DEBUG, "%s: Here comes the secret\n", __FUNCTION__);
264 bufferDump (chal->secret, strlen (chal->secret));
[all...]
H A Daaa.h39 unsigned char secret[MAXSTRLEN]; /* The shared secret */ member in struct:challenge
H A Dl2tp.h150 char secret[MAXSTRLEN]; /* Secret to use */ member in struct:tunnel
H A Dl2tpd.c1025 tmp->secret[0] = 0;
1036 tmp->chal_us.secret[0] = 0;
1039 tmp->chal_them.secret[0] = 0;
1237 printf("Usage: l2tpd -D -c [config file] -s [secret file] -p [pid file]\n");
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dauth.c793 error("No secret found for PAP login");
1295 "but I couldn't find any suitable secret (password) for it to use to do so.");
1379 char secret[MAXWORDLEN]; local
1411 * Open the file of pap secrets and scan for a suitable secret
1424 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1425 warn("no PAP secret found for %s", user);
1428 * If the secret is "@login", it means to check
1431 int login_secret = strcmp(secret, "@login") == 0;
1434 /* login option or secret is @login */
1438 if (secret[
1720 char secret[MAXWORDLEN]; local
1771 char secret[MAXWORDLEN]; local
[all...]
H A Dchap-md5.c58 unsigned char *secret, int secret_len,
70 /* Generate hash of ID, secret, challenge */
73 MD5_Update(&ctx, secret, secret_len);
89 unsigned char *challenge, char *secret, int secret_len,
98 MD5_Update(&ctx, secret, secret_len);
57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
H A Dchap-new.c398 unsigned char secret[MAXSECRETLEN]; local
401 /* Get the secret that the peer is supposed to know */
402 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) {
403 error("No CHAP secret found for authenticating %q", name);
407 ok = digest->verify_response(id, name, secret, secret_len, challenge,
409 memset(secret, 0, sizeof(secret));
426 char secret[MAXSECRETLEN+1]; local
442 /* get secret for authenticating ourselves with the specified host */
443 if (!get_secret(0, cs->name, rname, secret,
[all...]
H A Dchap-new.h102 unsigned char *secret, int secret_len,
106 unsigned char *challenge, char *secret, int secret_len,
H A Dchap_ms.c190 unsigned char *secret, int secret_len,
212 ChapMS(challenge, (char *)secret, secret_len, md);
238 unsigned char *secret, int secret_len,
253 (char *)secret, secret_len, md,
315 unsigned char *challenge, char *secret, int secret_len,
320 ChapMS(challenge, secret, secret_len, response);
325 unsigned char *challenge, char *secret, int secret_len,
336 our_name, secret, secret_len, response, private,
510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument
523 MD4Update(&md4Context, secret, 51
189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument
547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument
567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument
798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument
814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
[all...]
H A Deap.c83 static char *pn_secret = NULL; /* Pseudonym generating secret */
103 { "srp-pn-secret", o_string, &pn_secret,
104 "Long term pseudonym generation secret" },
312 * Set DES key according to pseudonym-generating secret and current
1319 char secret[MAXWORDLEN]; local
1439 * Get the secret for authenticating ourselves with
1443 rhostname, secret, &secret_len, 0)) {
1444 dbglog("EAP: no MD5 secret for auth to %q", rhostname);
1451 MD5_Update(&mdContext, secret, secret_len);
1452 BZERO(secret, sizeo
1729 char secret[MAXSECRETLEN]; local
[all...]
H A Dpppd.h82 #define MAXSECRETLEN 256 /* max length of password or secret */
558 /* get "secret" for chap */
559 int get_srp_secret __P((int unit, char *client, char *server, char *secret,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/radius/
H A Dconfig.c450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument
492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */
495 memset (secret, '\0', MAX_SECRET_LENGTH);
501 strncpy (secret, s, (size_t) len);
502 secret[MAX_SECRET_LENGTH] = '\0';
538 memset (secret, '\0', sizeof (secret));
H A Dradius.c200 * 1 -- we are ALWAYS willing to supply a secret. :-)
344 /* Need the RADIUS secret and Request Authenticator to decode MPPE */
739 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
747 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
803 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
818 MD5_Update(&Context, req_info->secret, strlen(req_info->secret));
[all...]
H A Dradiusclient.h358 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
H A Dsendserver.c33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument
106 secretlen = strlen (secret);
110 strcpy ((char *) md5buf, secret);
141 secretlen = strlen (secret);
142 strcpy ((char *) md5buf, secret);
209 char secret[MAX_SECRET_LENGTH + 1]; local
223 strcpy(secret, MGMT_POLL_SECRET);
229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0)
238 memset (secret, '\0', sizeof (secret));
395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Drpc_netlogon.h892 UNISTR2 secret; member in struct:__anon1621
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/
H A Dsmbrun.c186 sends the provided secret to the child stdin.
189 int smbrunsecret(char *cmd, char *secret) argument
230 /* send the secret */
231 write(ifd[1], secret, strlen(secret));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_parse/
H A Dparse_net.c2685 if (!smb_io_unistr2("secret", &info->secret, True, ps, depth))
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dac.c114 gcry_ac_key_t secret;
1664 key_pair_new->secret = key_secret;
1702 key = key_pair->secret;
1747 gcry_ac_key_destroy (key_pair->secret);
1942 DATA_ENCRYPTED with the secret key KEY under the control of the
2019 /* Signs the data contained in DATA with the secret key KEY and stores
2094 in DATA with the secret key belonging to the public key KEY. */
2975 with the secret key KEY_SECRET according to the Encryption Scheme
3091 secret key KEY according to the Signature Scheme SCHEME_ID. Handle
3185 is of size M_N, with the secret ke
113 gcry_ac_key_t secret; member in struct:gcry_ac_key_pair
[all...]
H A Dprimegen.c34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel,
291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret.
755 gen_prime (unsigned int nbits, int secret, int randomlevel,
774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits );
787 generating a secret prime we are most probably doing that
791 if (secret)
825 if (!mpi_test_bit( ptest, nbits-1-secret ))
753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
H A Drsa.c91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
119 /* Decrypt using the secret key. */
120 secret (decr_plaintext, ciphertext, sk);
129 /* Use the RSA secret function to create a signature of the plaintext. */
130 secret (signature, plaintext, sk);
237 /* select two (very secret) primes */
282 /* calculate the secret key d = e^1 mod phi */
541 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */
586 * Test whether the secret key is valid.
678 log_info ( "RSA secret ke
703 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dbasic.c38 const char *secret; member in struct:test_spec_pubkey_key
2627 err = gcry_sexp_sscan (&skey, NULL, spec.key.secret,
2628 strlen (spec.key.secret));
H A Dpubkey.c232 static const char *secret; local
237 case 0: secret = sample_private_key_1; break;
238 case 1: secret = sample_private_key_1_1; break;
239 case 2: secret = sample_private_key_1_2; break;
246 rc = gcry_sexp_sscan (&sec_key, NULL, secret, strlen (secret));
327 ? "(genkey (elg (nbits 4:1024)(xvalue my.not-so-secret.key)))"
843 die ("parameter d not found in RSA secret key [%d]\n", what);

Completed in 342 milliseconds

12