/freebsd-10.2-release/contrib/opie/libopie/ |
H A D | passcheck.c | 30 Applies "good password" rules to the secret pass phrase. 39 int opiepasscheck FUNCTION((secret), char *secret) argument 41 int len = strlen(secret);
|
H A D | keycrunch.c | 27 int opiekeycrunch FUNCTION((algorithm, result, seed, secret), int algorithm AND argument 28 struct opie_otpkey *result AND char *seed AND char *secret) 33 if (!result || !seed || !secret) 36 i = strlen(seed) + strlen(secret); 44 while(*c2 = *(secret++)) c2++; 51 strcpy(c2, secret);
|
H A D | generator.c | 15 Modified by cmetz for OPIE 2.32. If secret=NULL, always return 16 as if opieauto returned "get the secret". Renamed 26 OTP re-init extended responses (same secret) if sequence 136 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response) 162 if (*secret) { 163 if (opiepasscheck(secret)) 166 if (i = opiekeycrunch(algorithm, &key, seed, secret)) 185 if (opiekeycrunch(algorithm, &newkey, newseed, secret)) 238 if (*secret) { [all...] |
/freebsd-10.2-release/contrib/wpa/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 23 addr[1] = secret;
|
H A D | chap.h | 14 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge,
|
/freebsd-10.2-release/contrib/telnet/libtelnet/ |
H A D | pk.h | 42 genkeys(char *public, char *secret) 43 common_key(char *secret, char *public, desData *deskey) 46 char secret[HEXKEYBYTES + 1]; 55 extern void genkeys(char *public, char *secret); 56 extern void common_key(char *secret, char *public, IdeaData *common,
|
/freebsd-10.2-release/contrib/opie/ |
H A D | opiegen.c | 29 char secret[OPIE_SECRET_MAX+1]; local 62 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) { 63 fputs("Error reading secret pass phrase!\n", stderr); 67 switch (result = opiegenerator(buffer, secret, response)) { 69 fputs("Not a valid OTP secret pass phrase.\n", stderr); 81 memset(secret, 0, sizeof(secret)); 86 memset(secret, 0, sizeof(secret));
|
H A D | opiekey.c | 4 as command line arguments, prompts for the user's secret pass phrase, 98 static void getsecret FUNCTION((secret, promptextra, retype), char *secret AND char *promptextra AND int flags) 101 if (!opiereadpass(secret, OPIE_SECRET_MAX, 0)) { 105 if (secret[0] && (flags & 1)) { 112 memset(secret, 0, OPIE_SECRET_MAX + 1); 115 if (verify[0] && strcmp(verify, secret)) { 118 memset(secret, 0, OPIE_SECRET_MAX + 1); 123 if (!(flags & 2) && !aflag && opiepasscheck(secret)) { 124 memset(secret, 138 char secret[OPIE_SECRET_MAX + 1], newsecret[OPIE_SECRET_MAX + 1]; local [all...] |
/freebsd-10.2-release/contrib/wpa/src/crypto/ |
H A D | sha256-tlsprf.c | 17 * @secret: Key for PRF 29 void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, argument 48 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 49 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 50 * PRF(secret, label, seed) = P_SHA256(secret, label + seed) 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P); 58 hmac_sha256(secret, secret_le [all...] |
H A D | sha1-tlsprf.c | 18 * @secret: Key for PRF 30 int tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, argument 61 * A(0) = seed, A(i) = HMAC(secret, A(i-1)) 62 * P_hash = HMAC(secret, A(1) + seed) + HMAC(secret, A(2) + seed) + .. 67 S1 = secret; 68 S2 = secret + L_S1;
|
H A D | sha256.h | 20 void tls_prf_sha256(const u8 *secret, size_t secret_len,
|
H A D | sha1.h | 22 int __must_check tls_prf_sha1_md5(const u8 *secret, size_t secret_len,
|
/freebsd-10.2-release/usr.bin/keylogout/ |
H A D | keylogout.c | 38 * unset the secret key on local machine 50 static char secret[HEXKEYBYTES + 1]; local 62 if (key_setsecret(secret) < 0) { 63 fprintf(stderr, "Could not unset your secret key.\n");
|
/freebsd-10.2-release/usr.bin/csup/ |
H A D | cpasswd.sh | 38 local secret="`md5 -qs "$clientLower:$serverLower:$3"`" 39 _secret="\$md5\$$secret" 101 # Ask for password and generate secret. 107 secret=$_secret 113 if [ "X$secret" = "X$secret2" ]; then 124 echo "$clientName:$secret::"
|
/freebsd-10.2-release/lib/librpcsvc/ |
H A D | xcrypt.c | 54 * Encrypt a secret key given passwd 55 * The secret key is passed and returned in hex notation. 59 xencrypt(char *secret, char *passwd) argument 67 len = strlen(secret) / 2; 72 hex2bin(len, secret, buf); 81 bin2hex(len, (unsigned char *) buf, secret); 87 * Decrypt secret key using passwd 88 * The secret key is passed and returned in hex notation. 92 xdecrypt(char *secret, char *passwd) argument 100 len = strlen(secret) / [all...] |
/freebsd-10.2-release/usr.bin/chkey/ |
H A D | chkey.c | 85 char secret[HEXKEYBYTES + 1]; local 162 genkeys(public, secret, pass); 164 memcpy(crypt1, secret, HEXKEYBYTES); 165 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 173 || memcmp(crypt2, secret, HEXKEYBYTES) != 0) 206 if (write(fd, secret, strlen(secret)) < 0 || 213 if (key_setsecret(secret) < 0) 214 errx(1, "unable to login with new secret key"); 233 setpublicmap(char *name, char *public, char *secret) argument [all...] |
/freebsd-10.2-release/contrib/ntp/libntp/ |
H A D | authkeys.c | 28 u_char * secret; /* shared secret */ member in struct:savekey 33 size_t secretsize; /* secret octets */ 38 #define symkey_payload secret 101 u_char *cache_secret; /* secret */ 102 size_t cache_secretsize; /* secret length */ 373 * secret must be allocated with a free-compatible allocator. It is 384 u_char * secret, 402 sk->secret = secret; 378 allocsymkey( keyid_t id, u_short flags, u_short type, u_long lifetime, size_t secretsize, u_char * secret, KeyAccT * ka ) argument 657 u_char * secret; local [all...] |
/freebsd-10.2-release/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 86 unsigned char secret[64]; 90 /* Munge the password into a 64-byte secret. */ 91 memset(secret, 0, sizeof(secret)); 92 if (len <= sizeof(secret)) 93 memcpy(secret, password, len); 95 apr_md5(secret, password, len); 97 /* Compute MD5(secret XOR opad, MD5(secret XOR ipad, challenge)), 99 for (i = 0; i < sizeof(secret); 85 unsigned char secret[64]; local [all...] |
/freebsd-10.2-release/contrib/wpa/src/radius/ |
H A D | radius.h | 198 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, 200 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, 202 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, 205 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, 207 int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, 209 int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, 217 int radius_msg_verify(struct radius_msg *msg, const u8 *secret, 220 int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, 228 const u8 *secret, size_t secret_len); 231 const u8 *secret, size_ [all...] |
H A D | radius.c | 344 int radius_msg_finish(struct radius_msg *msg, const u8 *secret, argument 347 if (secret) { 361 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 375 int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret, argument 393 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 403 addr[3] = secret; 416 int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret, argument 435 hmac_md5(secret, secret_len, wpabuf_head(msg->buf), 441 addr[1] = secret; 455 void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret, argument 476 radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 498 radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret, size_t secret_len) argument 747 radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret, size_t secret_len, const u8 *req_auth) argument 797 radius_msg_verify(struct radius_msg *msg, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, int auth) argument 945 decrypt_ms_key(const u8 *key, size_t len, const u8 *req_authenticator, const u8 *secret, size_t secret_len, size_t *reslen) argument 1017 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1066 radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1107 radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg, const u8 *secret, size_t secret_len) argument 1136 radius_msg_add_mppe_keys(struct radius_msg *msg, const u8 *req_authenticator, const u8 *secret, size_t secret_len, const u8 *send_key, size_t send_key_len, const u8 *recv_key, size_t recv_key_len) argument 1210 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1412 radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen, const u8 *secret, size_t secret_len, struct radius_msg *sent_msg, size_t n) argument [all...] |
/freebsd-10.2-release/crypto/openssl/crypto/jpake/ |
H A D | jpaketest.c | 114 BIGNUM *secret = BN_new(); local 145 BN_rand(secret, 32, -1, 0); 148 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 149 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 160 alice = JPAKE_CTX_new("Alice", "Bob", p, g, q, secret); 161 BN_add_word(secret, 1); 162 bob = JPAKE_CTX_new("Bob", "Alice", p, g, q, secret); 165 fprintf(stderr, "Mismatched secret JPAKE run failed\n"); 172 BN_free(secret);
|
/freebsd-10.2-release/usr.bin/newkey/ |
H A D | newkey.c | 100 char secret[HEXKEYBYTES + 1]; local 139 genkeys(public, secret, pass); 141 memcpy(crypt1, secret, HEXKEYBYTES); 142 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE); 149 memcmp(crypt2, secret, HEXKEYBYTES) != 0) 182 setpublicmap(char *name, char *public, char *secret) argument 186 (void)sprintf(pkent, "%s:%s", public, secret);
|
/freebsd-10.2-release/usr.sbin/keyserv/ |
H A D | setkey.c | 44 * Store secret keys. Compute common keys, 106 * secret key associated with uid. 120 * secret key associated with uid. 175 MINT *secret; local 202 secret = mp_xtom(xsecret); 204 if ((public == NULL) || (secret == NULL)) 208 mp_pow(public, secret, MODULUS, common); 211 mp_mfree(secret); 232 MINT *secret; local 252 secret 493 keybuf secret; member in struct:cachekey_list [all...] |
/freebsd-10.2-release/usr.sbin/ctld/ |
H A D | chap.c | 45 chap_compute_md5(const char id, const char *secret, argument 56 MD5_Update(&ctx, secret, strlen(secret)); 321 chap_authenticate(struct chap *chap, const char *secret) argument 325 chap_compute_md5(chap->chap_id, secret, 345 rchap_new(const char *secret) argument 353 rchap->rchap_secret = checked_strdup(secret);
|
/freebsd-10.2-release/usr.sbin/iscsid/ |
H A D | chap.c | 45 chap_compute_md5(const char id, const char *secret, argument 56 MD5_Update(&ctx, secret, strlen(secret)); 321 chap_authenticate(struct chap *chap, const char *secret) argument 325 chap_compute_md5(chap->chap_id, secret, 345 rchap_new(const char *secret) argument 353 rchap->rchap_secret = checked_strdup(secret);
|