/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/tests/certs/scripts/ |
H A D | genroot.sh | 44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret 47 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr -passin pass:secret
|
H A D | genserv.sh | 71 $OPENSSL req -config $PREFIX-sv.prm -newkey rsa:$KEYSIZE -keyout $PREFIX-sv.key -out $PREFIX-sv.csr -passout pass:secret 75 $OPENSSL rsa -in $PREFIX-sv.key -out $PREFIX-sv.key -passin pass:secret
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/ |
H A D | aaa.c | 136 int get_secret (char *us, char *them, char *secret, int size) argument 197 "%s: Invalid authentication info (no secret), line %d\n", 206 "%s: we are '%s', they are '%s', secret is '%s'\n", 209 strncpy (secret, s, size); 252 if (!get_secret (us, them, chal->secret, sizeof (chal->secret))) 254 log (LOG_DEBUG, "%s: no secret found for us='%s' and them='%s'\n", 263 log (LOG_DEBUG, "%s: Here comes the secret\n", __FUNCTION__); 264 bufferDump (chal->secret, strlen (chal->secret)); [all...] |
H A D | aaa.h | 39 unsigned char secret[MAXSTRLEN]; /* The shared secret */ member in struct:challenge
|
H A D | l2tp.h | 150 char secret[MAXSTRLEN]; /* Secret to use */ member in struct:tunnel
|
H A D | l2tpd.c | 1025 tmp->secret[0] = 0; 1036 tmp->chal_us.secret[0] = 0; 1039 tmp->chal_them.secret[0] = 0; 1237 printf("Usage: l2tpd -D -c [config file] -s [secret file] -p [pid file]\n");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | auth.c | 793 error("No secret found for PAP login"); 1295 "but I couldn't find any suitable secret (password) for it to use to do so."); 1379 char secret[MAXWORDLEN]; local 1411 * Open the file of pap secrets and scan for a suitable secret 1424 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) { 1425 warn("no PAP secret found for %s", user); 1428 * If the secret is "@login", it means to check 1431 int login_secret = strcmp(secret, "@login") == 0; 1434 /* login option or secret is @login */ 1438 if (secret[ 1720 char secret[MAXWORDLEN]; local 1771 char secret[MAXWORDLEN]; local [all...] |
H A D | chap-md5.c | 58 unsigned char *secret, int secret_len, 70 /* Generate hash of ID, secret, challenge */ 73 MD5_Update(&ctx, secret, secret_len); 89 unsigned char *challenge, char *secret, int secret_len, 98 MD5_Update(&ctx, secret, secret_len); 57 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 88 chap_md5_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
|
H A D | chap-new.c | 398 unsigned char secret[MAXSECRETLEN]; local 401 /* Get the secret that the peer is supposed to know */ 402 if (!get_secret(0, name, ourname, (char *)secret, &secret_len, 1)) { 403 error("No CHAP secret found for authenticating %q", name); 407 ok = digest->verify_response(id, name, secret, secret_len, challenge, 409 memset(secret, 0, sizeof(secret)); 426 char secret[MAXSECRETLEN+1]; local 442 /* get secret for authenticating ourselves with the specified host */ 443 if (!get_secret(0, cs->name, rname, secret, [all...] |
H A D | chap-new.h | 102 unsigned char *secret, int secret_len, 106 unsigned char *challenge, char *secret, int secret_len,
|
H A D | chap_ms.c | 190 unsigned char *secret, int secret_len, 212 ChapMS(challenge, (char *)secret, secret_len, md); 238 unsigned char *secret, int secret_len, 253 (char *)secret, secret_len, md, 315 unsigned char *challenge, char *secret, int secret_len, 320 ChapMS(challenge, secret, secret_len, response); 325 unsigned char *challenge, char *secret, int secret_len, 336 our_name, secret, secret_len, response, private, 510 NTPasswordHash(u_char *secret, int secret_len, u_char hash[MD4_SIGNATURE_SIZE]) argument 523 MD4Update(&md4Context, secret, 51 189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 533 ChapMS_NT(u_char *rchallenge, char *secret, int secret_len, u_char NTResponse[24]) argument 547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, char *secret, int secret_len, u_char NTResponse[24]) argument 567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 683 Set_Start_Key(u_char *rchallenge, char *secret, int secret_len) argument 798 SetMasterKeys(char *secret, int secret_len, u_char NTResponse[24], int IsServer) argument 814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
H A D | eap.c | 83 static char *pn_secret = NULL; /* Pseudonym generating secret */ 103 { "srp-pn-secret", o_string, &pn_secret, 104 "Long term pseudonym generation secret" }, 312 * Set DES key according to pseudonym-generating secret and current 1319 char secret[MAXWORDLEN]; local 1439 * Get the secret for authenticating ourselves with 1443 rhostname, secret, &secret_len, 0)) { 1444 dbglog("EAP: no MD5 secret for auth to %q", rhostname); 1451 MD5_Update(&mdContext, secret, secret_len); 1452 BZERO(secret, sizeo 1729 char secret[MAXSECRETLEN]; local [all...] |
H A D | pppd.h | 82 #define MAXSECRETLEN 256 /* max length of password or secret */ 558 /* get "secret" for chap */ 559 int get_srp_secret __P((int unit, char *client, char *server, char *secret,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/radius/ |
H A D | config.c | 450 int rc_find_server (char *server_name, UINT4 *ip_addr, char *secret) argument 492 if ((s = strtok (NULL, " \t\n")) == NULL) /* and secret field */ 495 memset (secret, '\0', MAX_SECRET_LENGTH); 501 strncpy (secret, s, (size_t) len); 502 secret[MAX_SECRET_LENGTH] = '\0'; 538 memset (secret, '\0', sizeof (secret));
|
H A D | radius.c | 200 * 1 -- we are ALWAYS willing to supply a secret. :-) 344 /* Need the RADIUS secret and Request Authenticator to decode MPPE */ 739 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 747 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 803 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); 818 MD5_Update(&Context, req_info->secret, strlen(req_info->secret)); [all...] |
H A D | radiusclient.h | 358 char secret[MAX_SECRET_LENGTH + 1]; member in struct:request_info
|
H A D | sendserver.c | 33 static int rc_pack_list (VALUE_PAIR *vp, char *secret, AUTH_HDR *auth) argument 106 secretlen = strlen (secret); 110 strcpy ((char *) md5buf, secret); 141 secretlen = strlen (secret); 142 strcpy ((char *) md5buf, secret); 209 char secret[MAX_SECRET_LENGTH + 1]; local 223 strcpy(secret, MGMT_POLL_SECRET); 229 if (rc_find_server (server_name, &auth_ipaddr, secret) != 0) 238 memset (secret, '\0', sizeof (secret)); 395 rc_check_reply(AUTH_HDR *auth, int bufferlen, char *secret, unsigned char *vector, unsigned char seq_nbr) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | rpc_netlogon.h | 892 UNISTR2 secret; member in struct:__anon1621
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/ |
H A D | smbrun.c | 186 sends the provided secret to the child stdin. 189 int smbrunsecret(char *cmd, char *secret) argument 230 /* send the secret */ 231 write(ifd[1], secret, strlen(secret));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_parse/ |
H A D | parse_net.c | 2685 if (!smb_io_unistr2("secret", &info->secret, True, ps, depth))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | ac.c | 114 gcry_ac_key_t secret; 1664 key_pair_new->secret = key_secret; 1702 key = key_pair->secret; 1747 gcry_ac_key_destroy (key_pair->secret); 1942 DATA_ENCRYPTED with the secret key KEY under the control of the 2019 /* Signs the data contained in DATA with the secret key KEY and stores 2094 in DATA with the secret key belonging to the public key KEY. */ 2975 with the secret key KEY_SECRET according to the Encryption Scheme 3091 secret key KEY according to the Signature Scheme SCHEME_ID. Handle 3185 is of size M_N, with the secret ke 113 gcry_ac_key_t secret; member in struct:gcry_ac_key_pair [all...] |
H A D | primegen.c | 34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel, 291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret. 755 gen_prime (unsigned int nbits, int secret, int randomlevel, 774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits ); 787 generating a secret prime we are most probably doing that 791 if (secret) 825 if (!mpi_test_bit( ptest, nbits-1-secret )) 753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
|
H A D | rsa.c | 91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 119 /* Decrypt using the secret key. */ 120 secret (decr_plaintext, ciphertext, sk); 129 /* Use the RSA secret function to create a signature of the plaintext. */ 130 secret (signature, plaintext, sk); 237 /* select two (very secret) primes */ 282 /* calculate the secret key d = e^1 mod phi */ 541 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */ 586 * Test whether the secret key is valid. 678 log_info ( "RSA secret ke 703 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | basic.c | 38 const char *secret; member in struct:test_spec_pubkey_key 2627 err = gcry_sexp_sscan (&skey, NULL, spec.key.secret, 2628 strlen (spec.key.secret));
|
H A D | pubkey.c | 232 static const char *secret; local 237 case 0: secret = sample_private_key_1; break; 238 case 1: secret = sample_private_key_1_1; break; 239 case 2: secret = sample_private_key_1_2; break; 246 rc = gcry_sexp_sscan (&sec_key, NULL, secret, strlen (secret)); 327 ? "(genkey (elg (nbits 4:1024)(xvalue my.not-so-secret.key)))" 843 die ("parameter d not found in RSA secret key [%d]\n", what);
|