/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | config_ssid.h | 136 * passphrase - WPA ASCII passphrase 138 * If this is set, psk will be generated using the SSID and passphrase 139 * configured for the network. ASCII passphrase must be between 8 and 142 char *passphrase; member in struct:wpa_ssid 145 * ext_psk - PSK/passphrase name in external storage 147 * If this is set, PSK/passphrase will be fetched from external storage 310 * be set (either directly or using ASCII passphrase).
|
H A D | p2p_supplicant.c | 458 if (ssid->passphrase && !s->passphrase) 460 else if (ssid->passphrase && s->passphrase && 461 os_strcmp(ssid->passphrase, s->passphrase) != 0) 494 if (ssid->passphrase) { 495 os_free(s->passphrase); 496 s->passphrase = os_strdup(ssid->passphrase); [all...] |
H A D | config.c | 281 os_free(ssid->passphrase); 282 ssid->passphrase = NULL; 306 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 311 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 313 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 314 os_memcmp(ssid->passphrase, value, len) == 0) 317 os_free(ssid->passphrase); 318 ssid->passphrase = os_malloc(len + 1); 319 if (ssid->passphrase [all...] |
H A D | wps_supplicant.c | 397 os_free(ssid->passphrase); 398 ssid->passphrase = os_malloc(cred->key_len + 1); 399 if (ssid->passphrase == NULL) 401 os_memcpy(ssid->passphrase, cred->key, cred->key_len); 402 ssid->passphrase[cred->key_len] = '\0'; 1640 if (ssid->passphrase) { 1641 cred.key_len = os_strlen(ssid->passphrase); 1644 os_memcpy(cred.key, ssid->passphrase, cred.key_len);
|
/freebsd-10.0-release/sys/geom/eli/ |
H A D | pkcs5v2.h | 32 size_t saltsize, const char *passphrase, u_int iterations);
|
H A D | pkcs5v2.c | 53 size_t saltsize, const char *passphrase, u_int iterations) 60 passlen = strlen(passphrase); 73 g_eli_crypto_hmac(passphrase, passlen, saltcount, 78 g_eli_crypto_hmac(passphrase, passlen, md, sizeof(md), 93 uint8_t passphrase[] = "passphrase"; local 98 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase, 52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
|
H A D | g_eli.c | 72 "Number of tries for entering the passphrase"); 77 "Visibility of passphrase prompt (0 = invisible, 1 = visible, 2 = asterisk)"); 1026 char passphrase[256]; local 1061 /* If there is no passphrase, we try only once. */ 1064 /* Ask for the passphrase no more than g_eli_tries times. */ 1078 * No key files and no passphrase, something is 1081 * that there was really no passphrase and in that case 1090 /* Ask for the passphrase if defined. */ 1092 printf("Enter passphrase for %s: ", pp->name); 1093 cngets(passphrase, sizeo [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
H A D | crypto_openssl.c | 681 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 685 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), 690 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/freebsd-10.0-release/crypto/openssh/contrib/ |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
/freebsd-10.0-release/crypto/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | authfile.c | 7 * for reading the passphrase from the user. 80 * passphrase. The identification of the blob (lowest 64 bits of n) will 82 * passphrase. 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, argument 96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 99 cipher_num = (strcmp(passphrase, "") == 0) ? 107 /* Put checkbytes for checking passphrase validity. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 184 error("passphrase to 241 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument 258 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument 418 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument 519 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument 596 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument 641 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument 660 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument 698 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument 721 key_load_private(const char *filename, const char *passphrase, char **commentp) argument 845 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument [all...] |
H A D | sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; local 251 * load the private key. Try first with empty passphrase; if it 252 * fails, ask for a passphrase. 261 "Enter passphrase for RSA key '%.100s': ", comment); 263 passphrase = read_passphrase(buf, 0); 264 if (strcmp(passphrase, "") != 0) { 266 authfile, passphrase, NULL, NULL); 269 debug2("no passphrase given, try next key"); 272 memset(passphrase, 0, strlen(passphrase)); [all...] |
H A D | ssh-keygen.c | 64 * Flag indicating that we just want to change the passphrase. This can be 97 /* This is set to the passphrase if given on the command line. */ 100 /* This is set to the new passphrase if given on the command line. */ 251 pass = read_passphrase("Enter passphrase: ", 1212 * Perform changing a passphrase. The argument is the passwd structure 1229 /* Try to load the file with empty passphrase. */ 1236 read_passphrase("Enter old passphrase: ", 1243 printf("Bad passphrase.\n"); 1249 /* Ask the new passphrase (twice). */ 1255 read_passphrase("Enter new passphrase (empt 1331 char new_comment[1024], *comment, *passphrase; local [all...] |
H A D | cipher.c | 392 * passphrase and using the resulting 16 bytes as the key. 397 const char *passphrase, int do_encrypt) 403 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); 396 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument
|
H A D | sshconnect2.c | 1349 char prompt[300], *passphrase; local 1368 "Enter passphrase for key '%.100s': ", filename); 1370 passphrase = read_passphrase(prompt, 0); 1371 if (strcmp(passphrase, "") != 0) { 1373 filename, passphrase, NULL, NULL); 1376 debug2("no passphrase given, try next key"); 1379 memset(passphrase, 0, strlen(passphrase)); 1380 free(passphrase); 1383 debug2("bad passphrase give [all...] |
/freebsd-10.0-release/contrib/subversion/subversion/include/private/ |
H A D | svn_auth_private.h | 153 certificate passphrase credential cache store identified by 154 PASSTYPE. PASSPHRASE_GET is used to obtain the passphrase value. 158 several of the ssl client passphrase credential providers (the 172 client certificate passphrase credential cache store identified by 192 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS; 196 const char **passphrase, 211 const char *passphrase,
|
/freebsd-10.0-release/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 75 static const char *pam_ssh_prompt = "SSH passphrase: "; 92 * directory, using the specified passphrase. If successful, returns a 96 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, argument 108 * If the key is unencrypted, OpenSSL ignores the passphrase, so 110 * a user to circumvent nullok by providing a dummy passphrase. 112 * with an empty passphrase, and if the key is not encrypted, 113 * accept only an empty passphrase. 116 if (key != NULL && !(*passphrase == '\0' && nullok)) { 121 key = key_load_private(fn, passphrase, &comment); 157 const char **kfn, *passphrase, *use local [all...] |
/freebsd-10.0-release/contrib/apr-util/include/private/ |
H A D | apr_crypto_internal.h | 83 * @brief Create a key from the given passphrase. By default, the PBKDF2 84 * algorithm is used to generate the key from the passphrase. It is expected 94 * @param pass The passphrase to use. 95 * @param passLen The passphrase length in bytes 110 apr_status_t (*passphrase)(apr_crypto_key_t **key, apr_size_t *ivSize, member in struct:apr_crypto_driver_t
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | ssl_client_cert_pw_providers.c | 46 * AUTHN_PASSTYPE_KEY just records the passphrase type next to the 47 * passphrase, so that anyone who is manually editing their authn 50 #define AUTHN_PASSPHRASE_KEY "passphrase" 53 /* Baton type for the ssl client cert passphrase provider. */ 66 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS; 70 const char **passphrase, 82 *passphrase = str->data; 97 const char *passphrase, 103 svn_string_create(passphrase, pool)); 136 /* Try to load passphrase fro 68 svn_auth__ssl_client_cert_pw_get(svn_boolean_t *done, const char **passphrase, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 92 svn_auth__ssl_client_cert_pw_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *passphrase, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument [all...] |
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | ieee802_11_auth.c | 424 char *passphrase, *strpassphrase; local 432 passphrase = radius_msg_get_tunnel_password( 439 if (passphrase == NULL) 442 * passphrase does not contain the NULL termination. 448 os_memcpy(strpassphrase, passphrase, passphraselen); 459 os_free(passphrase);
|
/freebsd-10.0-release/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 42 Summary: A passphrase dialog for OpenSSH and the X window System. 77 This package contains an X Window System passphrase dialog for OpenSSH.
|