Lines Matching refs:passphrase

7  * for reading the passphrase from the user.
95 key_private_to_blob2(Key *prv, Buffer *blob, const char *passphrase,
109 if (passphrase == NULL || !strlen(passphrase)) {
127 if (bcrypt_pbkdf(passphrase, strlen(passphrase),
203 key_parse_private2(Buffer *blob, int type, const char *passphrase,
277 if ((passphrase == NULL || !strlen(passphrase)) &&
279 /* passphrase required */
347 if (bcrypt_pbkdf(passphrase, strlen(passphrase), salt, slen,
423 * passphrase. The identification of the blob (lowest 64 bits of n) will
425 * passphrase.
428 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase,
439 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
442 cipher_num = (strcmp(passphrase, "") == 0) ?
450 /* Put checkbytes for checking passphrase validity. */
493 cipher_set_key_string(&ciphercontext, cipher, passphrase,
518 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL;
528 error("passphrase too short: have %d bytes, need > 4", len);
538 cipher, passphrase, len, NULL, NULL);
543 cipher, passphrase, len, NULL, NULL);
548 cipher, passphrase, len, NULL, NULL);
585 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase,
591 return key_private_rsa1_to_blob(key, blob, passphrase, comment);
596 return key_private_to_blob2(key, blob, passphrase,
599 return key_private_pem_to_blob(key, blob, passphrase, comment);
601 return key_private_to_blob2(key, blob, passphrase,
610 key_save_private(Key *key, const char *filename, const char *passphrase,
618 if (!key_private_to_blob(key, &keyblob, passphrase, comment,
772 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp)
827 /* Rest of the buffer is encrypted. Decrypt it using the passphrase. */
828 cipher_set_key_string(&ciphercontext, cipher, passphrase,
841 if (strcmp(passphrase, "") != 0)
842 debug("Bad passphrase supplied for RSA1 key");
843 /* Bad passphrase. */
874 key_parse_private_pem(Buffer *blob, int type, const char *passphrase,
888 pk = PEM_read_bio_PrivateKey(bio, NULL, NULL, (char *)passphrase);
951 key_load_private_pem(int fd, int type, const char *passphrase,
962 prv = key_parse_private_pem(&buffer, type, passphrase, commentp);
996 key_parse_private_type(Buffer *blob, int type, const char *passphrase,
1003 return key_parse_private_rsa1(blob, passphrase, commentp);
1007 return key_parse_private_pem(blob, type, passphrase, commentp);
1009 return key_parse_private2(blob, type, passphrase, commentp);
1011 if ((k = key_parse_private2(blob, type, passphrase, commentp)))
1013 return key_parse_private_pem(blob, type, passphrase, commentp);
1022 key_load_private_type(int type, const char *filename, const char *passphrase,
1054 ret = key_parse_private_type(&buffer, type, passphrase, commentp);
1061 const char *passphrase, char **commentp)
1069 passphrase, NULL);
1076 prv = key_parse_private_type(buffer, KEY_RSA1, passphrase,
1083 key_load_private(const char *filename, const char *passphrase,
1110 prv = key_parse_private(&buffer, filename, passphrase, commentp);
1207 key_load_private_cert(int type, const char *filename, const char *passphrase,
1224 passphrase, NULL, perm_ok)) == NULL)