/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkcs12.c | 78 char *passphrase, *friendlyname; local 86 passphrase = NIL_P(pass) ? NULL : StringValuePtr(pass); 107 p12 = PKCS12_create(passphrase, friendlyname, key, x509, x509s, 135 char *passphrase; local 143 passphrase = NIL_P(pass) ? NULL : StringValuePtr(pass); 150 if(!PKCS12_parse(pkcs, passphrase, &key, &x509, &x509s))
|
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | keychain_import.c | 55 const char *passphrase, 77 * Specify some kind of passphrase in case caller doesn't know this 82 if(passphrase != NULL) { 83 passStr = CFStringCreateWithCString(NULL, passphrase, kCFStringEncodingASCII); 84 keyParams.passphrase = passStr; 240 const char *passphrase = NULL; local 337 passphrase = optarg; 474 nonExtractable, passphrase, inFile, attrNames, 48 do_keychain_import( SecKeychainRef kcRef, CFDataRef inData, SecExternalFormat externFormat, SecExternalItemType itemType, SecAccessRef access, Boolean nonExtractable, const char *passphrase, const char *fileName, char **attrNames, char **attrValues, unsigned numExtendedAttributes) argument
|
/macosx-10.10/apache-793/httpd/modules/session/ |
H A D | mod_session_crypto.c | 137 const char *passphrase; local 154 /* encrypt using the first passphrase in the list */ 155 passphrase = APR_ARRAY_IDX(dconf->passphrases, 0, char *); 156 res = apr_crypto_passphrase(&key, &ivSize, passphrase, 157 strlen(passphrase), 162 "the passphrase '%s' was empty", passphrase); 249 /* try each passphrase in turn */ 251 const char *passphrase = APR_ARRAY_IDX(dconf->passphrases, i, char *); local 255 /* encrypt using the first passphrase i 540 const char **passphrase; local [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | sshconnect1.c | 216 char buf[300], *passphrase, *comment, *authfile; local 257 * load the private key. Try first with empty passphrase; if it 258 * fails, ask for a passphrase. 267 "Enter passphrase for RSA key '%.100s': ", comment); 270 passphrase = keychain_read_passphrase(comment, options.ask_pass_gui); 271 if (passphrase == NULL) 273 passphrase = read_passphrase(buf, 0); 274 if (strcmp(passphrase, "") != 0) { 276 authfile, passphrase, NULL, NULL); 279 debug2("no passphrase give [all...] |
H A D | keychain.c | 91 * Store the passphrase for a given identity in the keychain. 94 store_in_keychain(const char *filename, const char *passphrase) argument 160 /* Check if we already have this passphrase. */ 193 kSecGenericPasswordItemClass, &attrList, strlen(passphrase), 194 passphrase, NULL, initialAccess, NULL) == noErr) 201 strlen(passphrase), passphrase) == noErr) 248 * Remove the passphrase for a given identity from the keychain. 306 /* Check if we already have this passphrase. */ 310 /* Remove the passphrase fro 392 char *passphrase = NULL; local [all...] |
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | tokenacl.cpp | 148 Reason accept(CssmManagedData &passphrase, CssmData *oldPassphrase); 151 SecurityAgent::Reason QueryNewPin::accept(CssmManagedData &passphrase, CssmData *oldPassphrase) argument 159 new(alloc) ListElement(passphrase)
|
H A D | kcdatabase.cpp | 96 syslog(LOG_ERR, "Updating iCloud keychain passphrase for uid %d", dbCommon.session().originatorUid()); 401 // Change the passphrase on a database 632 // The following unlock given an explicit passphrase, rather than using 635 void KeychainDatabase::unlockDb(const CssmData &passphrase) argument 638 makeUnlocked(passphrase); 641 void KeychainDatabase::makeUnlocked(const CssmData &passphrase) argument 644 if (decode(passphrase)) 648 } else if (!mValidData) { // need to decode to get our ACLs, passphrase available 657 unlock_keybag(common(), passphrase.data(), (int)passphrase 671 decode(const CssmData &passphrase) argument [all...] |
H A D | kcdatabase.h | 194 void unlockDb(const CssmData &passphrase); // unlock with passphrase 200 bool decode(const CssmData &passphrase); // set master key from PP, try unlock 202 bool validatePassphrase(const CssmData &passphrase) const; // nonthrowing validation 239 void makeUnlocked(const CssmData &passphrase); // interior version of unlock(CssmData)
|
H A D | dbcrypto.cpp | 99 // Establish the master secret as derived from a passphrase passed in. 102 // Note that the passphrase is NOT remembered; only the master key. 104 void DatabaseCryptoCore::setup(const DbBlob *blob, const CssmData &passphrase) argument 110 mMasterKey = deriveDbMasterKey(passphrase); 149 // Given a putative passphrase, determine whether that passphrase 155 // thus indicate a problem *beyond* (just) a bad passphrase. 157 bool DatabaseCryptoCore::validatePassphrase(const CssmData &passphrase) argument 160 CssmClient::Key master = deriveDbMasterKey(passphrase); 499 // Derive the blob-specific database blob encryption key from the passphrase an [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecImportExport.h | 120 * When true, passphrase for import/export is obtained by user prompt 121 * instead of by caller-supplied data (SecKeyImportExportParameters.passphrase). 122 * This is the preferred method for obtaining a user-supplied passphrase 123 * as it avoids having the cleartext passphrase appear in the app's 151 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon3779 154 CFStringRef alertTitle; /* title of secure passphrase alert panel */ 155 CFStringRef alertPrompt; /* prompt in secure passphrase alert panel */ 171 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon3780 174 CFStringRef alertTitle; /* title of secure passphrase alert panel */ 175 CFStringRef alertPrompt; /* prompt in secure passphrase aler [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecImportExport.h | 120 * When true, passphrase for import/export is obtained by user prompt 121 * instead of by caller-supplied data (SecKeyImportExportParameters.passphrase). 122 * This is the preferred method for obtaining a user-supplied passphrase 123 * as it avoids having the cleartext passphrase appear in the app's 151 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4665 154 CFStringRef alertTitle; /* title of secure passphrase alert panel */ 155 CFStringRef alertPrompt; /* prompt in secure passphrase alert panel */ 171 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4666 174 CFStringRef alertTitle; /* title of secure passphrase alert panel */ 175 CFStringRef alertPrompt; /* prompt in secure passphrase aler [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecImportExport.h | 120 * When true, passphrase for import/export is obtained by user prompt 121 * instead of by caller-supplied data (SecKeyImportExportParameters.passphrase). 122 * This is the preferred method for obtaining a user-supplied passphrase 123 * as it avoids having the cleartext passphrase appear in the app's 151 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4752 154 CFStringRef alertTitle; /* title of secure passphrase alert panel */ 155 CFStringRef alertPrompt; /* prompt in secure passphrase alert panel */ 171 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4753 174 CFStringRef alertTitle; /* title of secure passphrase alert panel */ 175 CFStringRef alertPrompt; /* prompt in secure passphrase aler [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | deriveKey.cpp | 65 /* Get passphrase from either baseKey or from CSSM_PKCS5_PBKDF2_PARAMS */ 68 uint8 *passphrase = NULL; local 72 passphrase, passphraseLen); 76 passphrase = pbkdf2Params->Passphrase.Data; 80 /* passphrase required */ 81 if(passphrase == NULL) { 87 errorLog0("DeriveKey_PBKDF2: zero length passphrase\n"); 128 passphrase, (uint32)passphraseLen, 157 /* Get secure passphrase from base key */ 171 errorLog0("DeriveKey_PKCS5_V1_5: zero length passphrase\ [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/kcImport/ |
H A D | kcImport.cpp | 20 printf(" -z passphrase For PKCS12 and wrapped keys only\n"); 36 printf("Secure passphrase options:\n"); 37 printf(" -Z Get secure passphrase\n"); 300 CFStringRef passphrase = NULL; local 338 passphrase = CFStringCreateWithCString(NULL, optarg, 493 if(passphrase || securePassphrase || allowClearExtract || noACL || 509 else if(passphrase) { 510 keyParams.passphrase = passphrase;
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/crypto/ |
H A D | pbkdf2-00-hmac-sha1.c | 29 pbkdf2_hmac_sha1_deriviation(const uint8_t *passphrase, size_t passphrase_length, argument 37 pbkdf2(hmac_sha1, 20, passphrase, passphrase_length,
|
/macosx-10.10/security_systemkeychain-55202/src/ |
H A D | systemkeychain.cpp | 75 void createSystemKeychain(const char *kcName, const char *passphrase); 87 void createAKeychain(const char *kcName, const char *passphrase, CSP &csp, DL &dl, Db &db, Key *masterKeyRef); 199 fprintf(stderr, "Usage: systemkeychain -C [passphrase] # (re)create system root keychain" 210 void createSystemKeychain(const char *kcName, const char *passphrase) argument 224 createAKeychain(kcName, passphrase, csp, dl, db, &masterKey); 230 void createAKeychain(const char *kcName, const char *passphrase, CSP &csp, DL &dl, Db &db, Key *masterKeyRef) argument 236 if (passphrase) { 237 // use this passphrase 240 new(alloc) ListElement(StringData(passphrase))); 243 new(alloc) ListElement(StringData(passphrase))); [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | pkcs12_util.c | 334 const char * passphrase = NULL; local 344 passphrase = optarg; 360 if (argc != 1 || !passphrase) 364 array = PKCS12FileCreateArray(filename, passphrase);
|
/macosx-10.10/Security-57031.1.35/securityd/tests/ |
H A D | testblobs.cpp | 86 StringData passphrase("two"); 90 new(alloc) ListElement(passphrase)); 98 // db2.passphrase = two 124 // db2 has a passphrase lock credentials - it'll work without U/I 125 db2.unlock("wrong passphrase"); // pw=two, cred=three 129 new(alloc) ListElement(passphrase)); 135 // now change db2's passphrase 142 // passphrase = three, cred = (OLD: two) 151 db2.unlock("old passphrase accepted"); 153 // back to the old credentials, which *do* have the (old bad, now good) passphrase [all...] |
/macosx-10.10/apr-32/apr-util/apr-util/include/private/ |
H A D | apr_crypto_internal.h | 83 * @brief Create a key from the given passphrase. By default, the PBKDF2 84 * algorithm is used to generate the key from the passphrase. It is expected 94 * @param pass The passphrase to use. 95 * @param passLen The passphrase length in bytes 110 apr_status_t (*passphrase)(apr_crypto_key_t **key, apr_size_t *ivSize, member in struct:apr_crypto_driver_t
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | ssh.h | 110 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | p12pbegen.c | 51 int p12_pbe_gen(CFStringRef passphrase, uint8_t *salt_ptr, size_t salt_length, argument 57 if (!passphrase) 64 /* convert passphrase to BE UTF16 and append double null */ 65 CFDataRef passphrase_be_unicode = CFStringCreateExternalRepresentation(kCFAllocatorDefault, passphrase, kCFStringEncodingUTF16BE, '\0'); 75 /* generate passphrase block */ 117 when the passphrase + salt are over 2^32 bytes long */
|
/macosx-10.10/emacs-93/emacs/lisp/gnus/ |
H A D | mml1991.el | 189 passphrase sign-with-key armor textmode) 192 plaintext ciphertext result recipients passphrase 195 plaintext ciphertext result recipients passphrase
|
/macosx-10.10/Security-57031.1.35/Security/include/security_pkcs12/ |
H A D | SecPkcs12.cpp | 123 CFStringRef passphrase) 128 required(passphrase); 129 p12coder->setMacPassPhrase(passphrase); 148 * Specify separate passphrase for encrypt/decrypt. 152 CFStringRef passphrase) 157 required(passphrase); 158 p12coder->setEncrPassPhrase(passphrase); 121 SecPkcs12SetMACPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument 150 SecPkcs12SetCryptPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/ |
H A D | SecPkcs12.cpp | 123 CFStringRef passphrase) 128 required(passphrase); 129 p12coder->setMacPassPhrase(passphrase); 148 * Specify separate passphrase for encrypt/decrypt. 152 CFStringRef passphrase) 157 required(passphrase); 158 p12coder->setEncrPassPhrase(passphrase); 121 SecPkcs12SetMACPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument 150 SecPkcs12SetCryptPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument
|
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/ |
H A D | ssl-utils.c | 90 params.passphrase=CFSTR("password");
|