Searched refs:passphrase (Results 26 - 50 of 104) sorted by relevance

12345

/macosx-10.10/ruby-106/ruby/ext/openssl/
H A Dossl_pkcs12.c78 char *passphrase, *friendlyname; local
86 passphrase = NIL_P(pass) ? NULL : StringValuePtr(pass);
107 p12 = PKCS12_create(passphrase, friendlyname, key, x509, x509s,
135 char *passphrase; local
143 passphrase = NIL_P(pass) ? NULL : StringValuePtr(pass);
150 if(!PKCS12_parse(pkcs, passphrase, &key, &x509, &x509s))
/macosx-10.10/Security-57031.1.35/SecurityTool/
H A Dkeychain_import.c55 const char *passphrase,
77 * Specify some kind of passphrase in case caller doesn't know this
82 if(passphrase != NULL) {
83 passStr = CFStringCreateWithCString(NULL, passphrase, kCFStringEncodingASCII);
84 keyParams.passphrase = passStr;
240 const char *passphrase = NULL; local
337 passphrase = optarg;
474 nonExtractable, passphrase, inFile, attrNames,
48 do_keychain_import( SecKeychainRef kcRef, CFDataRef inData, SecExternalFormat externFormat, SecExternalItemType itemType, SecAccessRef access, Boolean nonExtractable, const char *passphrase, const char *fileName, char **attrNames, char **attrValues, unsigned numExtendedAttributes) argument
/macosx-10.10/apache-793/httpd/modules/session/
H A Dmod_session_crypto.c137 const char *passphrase; local
154 /* encrypt using the first passphrase in the list */
155 passphrase = APR_ARRAY_IDX(dconf->passphrases, 0, char *);
156 res = apr_crypto_passphrase(&key, &ivSize, passphrase,
157 strlen(passphrase),
162 "the passphrase '%s' was empty", passphrase);
249 /* try each passphrase in turn */
251 const char *passphrase = APR_ARRAY_IDX(dconf->passphrases, i, char *); local
255 /* encrypt using the first passphrase i
540 const char **passphrase; local
[all...]
/macosx-10.10/OpenSSH-189/openssh/
H A Dsshconnect1.c216 char buf[300], *passphrase, *comment, *authfile; local
257 * load the private key. Try first with empty passphrase; if it
258 * fails, ask for a passphrase.
267 "Enter passphrase for RSA key '%.100s': ", comment);
270 passphrase = keychain_read_passphrase(comment, options.ask_pass_gui);
271 if (passphrase == NULL)
273 passphrase = read_passphrase(buf, 0);
274 if (strcmp(passphrase, "") != 0) {
276 authfile, passphrase, NULL, NULL);
279 debug2("no passphrase give
[all...]
H A Dkeychain.c91 * Store the passphrase for a given identity in the keychain.
94 store_in_keychain(const char *filename, const char *passphrase) argument
160 /* Check if we already have this passphrase. */
193 kSecGenericPasswordItemClass, &attrList, strlen(passphrase),
194 passphrase, NULL, initialAccess, NULL) == noErr)
201 strlen(passphrase), passphrase) == noErr)
248 * Remove the passphrase for a given identity from the keychain.
306 /* Check if we already have this passphrase. */
310 /* Remove the passphrase fro
392 char *passphrase = NULL; local
[all...]
/macosx-10.10/Security-57031.1.35/securityd/src/
H A Dtokenacl.cpp148 Reason accept(CssmManagedData &passphrase, CssmData *oldPassphrase);
151 SecurityAgent::Reason QueryNewPin::accept(CssmManagedData &passphrase, CssmData *oldPassphrase) argument
159 new(alloc) ListElement(passphrase)
H A Dkcdatabase.cpp96 syslog(LOG_ERR, "Updating iCloud keychain passphrase for uid %d", dbCommon.session().originatorUid());
401 // Change the passphrase on a database
632 // The following unlock given an explicit passphrase, rather than using
635 void KeychainDatabase::unlockDb(const CssmData &passphrase) argument
638 makeUnlocked(passphrase);
641 void KeychainDatabase::makeUnlocked(const CssmData &passphrase) argument
644 if (decode(passphrase))
648 } else if (!mValidData) { // need to decode to get our ACLs, passphrase available
657 unlock_keybag(common(), passphrase.data(), (int)passphrase
671 decode(const CssmData &passphrase) argument
[all...]
H A Dkcdatabase.h194 void unlockDb(const CssmData &passphrase); // unlock with passphrase
200 bool decode(const CssmData &passphrase); // set master key from PP, try unlock
202 bool validatePassphrase(const CssmData &passphrase) const; // nonthrowing validation
239 void makeUnlocked(const CssmData &passphrase); // interior version of unlock(CssmData)
H A Ddbcrypto.cpp99 // Establish the master secret as derived from a passphrase passed in.
102 // Note that the passphrase is NOT remembered; only the master key.
104 void DatabaseCryptoCore::setup(const DbBlob *blob, const CssmData &passphrase) argument
110 mMasterKey = deriveDbMasterKey(passphrase);
149 // Given a putative passphrase, determine whether that passphrase
155 // thus indicate a problem *beyond* (just) a bad passphrase.
157 bool DatabaseCryptoCore::validatePassphrase(const CssmData &passphrase) argument
160 CssmClient::Key master = deriveDbMasterKey(passphrase);
499 // Derive the blob-specific database blob encryption key from the passphrase an
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecImportExport.h120 * When true, passphrase for import/export is obtained by user prompt
121 * instead of by caller-supplied data (SecKeyImportExportParameters.passphrase).
122 * This is the preferred method for obtaining a user-supplied passphrase
123 * as it avoids having the cleartext passphrase appear in the app's
151 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon3779
154 CFStringRef alertTitle; /* title of secure passphrase alert panel */
155 CFStringRef alertPrompt; /* prompt in secure passphrase alert panel */
171 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon3780
174 CFStringRef alertTitle; /* title of secure passphrase alert panel */
175 CFStringRef alertPrompt; /* prompt in secure passphrase aler
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecImportExport.h120 * When true, passphrase for import/export is obtained by user prompt
121 * instead of by caller-supplied data (SecKeyImportExportParameters.passphrase).
122 * This is the preferred method for obtaining a user-supplied passphrase
123 * as it avoids having the cleartext passphrase appear in the app's
151 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4665
154 CFStringRef alertTitle; /* title of secure passphrase alert panel */
155 CFStringRef alertPrompt; /* prompt in secure passphrase alert panel */
171 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4666
174 CFStringRef alertTitle; /* title of secure passphrase alert panel */
175 CFStringRef alertPrompt; /* prompt in secure passphrase aler
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecImportExport.h120 * When true, passphrase for import/export is obtained by user prompt
121 * instead of by caller-supplied data (SecKeyImportExportParameters.passphrase).
122 * This is the preferred method for obtaining a user-supplied passphrase
123 * as it avoids having the cleartext passphrase appear in the app's
151 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4752
154 CFStringRef alertTitle; /* title of secure passphrase alert panel */
155 CFStringRef alertPrompt; /* prompt in secure passphrase alert panel */
171 CFTypeRef passphrase; /* kSecFormatPKCS12, kSecFormatWrapped* member in struct:__anon4753
174 CFStringRef alertTitle; /* title of secure passphrase alert panel */
175 CFStringRef alertPrompt; /* prompt in secure passphrase aler
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DderiveKey.cpp65 /* Get passphrase from either baseKey or from CSSM_PKCS5_PBKDF2_PARAMS */
68 uint8 *passphrase = NULL; local
72 passphrase, passphraseLen);
76 passphrase = pbkdf2Params->Passphrase.Data;
80 /* passphrase required */
81 if(passphrase == NULL) {
87 errorLog0("DeriveKey_PBKDF2: zero length passphrase\n");
128 passphrase, (uint32)passphraseLen,
157 /* Get secure passphrase from base key */
171 errorLog0("DeriveKey_PKCS5_V1_5: zero length passphrase\
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/kcImport/
H A DkcImport.cpp20 printf(" -z passphrase For PKCS12 and wrapped keys only\n");
36 printf("Secure passphrase options:\n");
37 printf(" -Z Get secure passphrase\n");
300 CFStringRef passphrase = NULL; local
338 passphrase = CFStringCreateWithCString(NULL, optarg,
493 if(passphrase || securePassphrase || allowClearExtract || noACL ||
509 else if(passphrase) {
510 keyParams.passphrase = passphrase;
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/crypto/
H A Dpbkdf2-00-hmac-sha1.c29 pbkdf2_hmac_sha1_deriviation(const uint8_t *passphrase, size_t passphrase_length, argument
37 pbkdf2(hmac_sha1, 20, passphrase, passphrase_length,
/macosx-10.10/security_systemkeychain-55202/src/
H A Dsystemkeychain.cpp75 void createSystemKeychain(const char *kcName, const char *passphrase);
87 void createAKeychain(const char *kcName, const char *passphrase, CSP &csp, DL &dl, Db &db, Key *masterKeyRef);
199 fprintf(stderr, "Usage: systemkeychain -C [passphrase] # (re)create system root keychain"
210 void createSystemKeychain(const char *kcName, const char *passphrase) argument
224 createAKeychain(kcName, passphrase, csp, dl, db, &masterKey);
230 void createAKeychain(const char *kcName, const char *passphrase, CSP &csp, DL &dl, Db &db, Key *masterKeyRef) argument
236 if (passphrase) {
237 // use this passphrase
240 new(alloc) ListElement(StringData(passphrase)));
243 new(alloc) ListElement(StringData(passphrase)));
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/
H A Dpkcs12_util.c334 const char * passphrase = NULL; local
344 passphrase = optarg;
360 if (argc != 1 || !passphrase)
364 array = PKCS12FileCreateArray(filename, passphrase);
/macosx-10.10/Security-57031.1.35/securityd/tests/
H A Dtestblobs.cpp86 StringData passphrase("two");
90 new(alloc) ListElement(passphrase));
98 // db2.passphrase = two
124 // db2 has a passphrase lock credentials - it'll work without U/I
125 db2.unlock("wrong passphrase"); // pw=two, cred=three
129 new(alloc) ListElement(passphrase));
135 // now change db2's passphrase
142 // passphrase = three, cred = (OLD: two)
151 db2.unlock("old passphrase accepted");
153 // back to the old credentials, which *do* have the (old bad, now good) passphrase
[all...]
/macosx-10.10/apr-32/apr-util/apr-util/include/private/
H A Dapr_crypto_internal.h83 * @brief Create a key from the given passphrase. By default, the PBKDF2
84 * algorithm is used to generate the key from the passphrase. It is expected
94 * @param pass The passphrase to use.
95 * @param passLen The passphrase length in bytes
110 apr_status_t (*passphrase)(apr_crypto_key_t **key, apr_size_t *ivSize, member in struct:apr_crypto_driver_t
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dssh.h110 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A Dp12pbegen.c51 int p12_pbe_gen(CFStringRef passphrase, uint8_t *salt_ptr, size_t salt_length, argument
57 if (!passphrase)
64 /* convert passphrase to BE UTF16 and append double null */
65 CFDataRef passphrase_be_unicode = CFStringCreateExternalRepresentation(kCFAllocatorDefault, passphrase, kCFStringEncodingUTF16BE, '\0');
75 /* generate passphrase block */
117 when the passphrase + salt are over 2^32 bytes long */
/macosx-10.10/emacs-93/emacs/lisp/gnus/
H A Dmml1991.el189 passphrase sign-with-key armor textmode)
192 plaintext ciphertext result recipients passphrase
195 plaintext ciphertext result recipients passphrase
/macosx-10.10/Security-57031.1.35/Security/include/security_pkcs12/
H A DSecPkcs12.cpp123 CFStringRef passphrase)
128 required(passphrase);
129 p12coder->setMacPassPhrase(passphrase);
148 * Specify separate passphrase for encrypt/decrypt.
152 CFStringRef passphrase)
157 required(passphrase);
158 p12coder->setEncrPassPhrase(passphrase);
121 SecPkcs12SetMACPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument
150 SecPkcs12SetCryptPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/
H A DSecPkcs12.cpp123 CFStringRef passphrase)
128 required(passphrase);
129 p12coder->setMacPassPhrase(passphrase);
148 * Specify separate passphrase for encrypt/decrypt.
152 CFStringRef passphrase)
157 required(passphrase);
158 p12coder->setEncrPassPhrase(passphrase);
121 SecPkcs12SetMACPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument
150 SecPkcs12SetCryptPassphrase( SecPkcs12CoderRef coder, CFStringRef passphrase) argument
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/
H A Dssl-utils.c90 params.passphrase=CFSTR("password");

Completed in 312 milliseconds

12345