Searched refs:passphrase (Results 1 - 25 of 39) sorted by relevance

12

/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6
[all...]
H A Dconfig_ssid.h136 * passphrase - WPA ASCII passphrase
138 * If this is set, psk will be generated using the SSID and passphrase
139 * configured for the network. ASCII passphrase must be between 8 and
142 char *passphrase; member in struct:wpa_ssid
145 * ext_psk - PSK/passphrase name in external storage
147 * If this is set, PSK/passphrase will be fetched from external storage
310 * be set (either directly or using ASCII passphrase).
H A Dp2p_supplicant.c458 if (ssid->passphrase && !s->passphrase)
460 else if (ssid->passphrase && s->passphrase &&
461 os_strcmp(ssid->passphrase, s->passphrase) != 0)
494 if (ssid->passphrase) {
495 os_free(s->passphrase);
496 s->passphrase = os_strdup(ssid->passphrase);
[all...]
H A Dconfig.c281 os_free(ssid->passphrase);
282 ssid->passphrase = NULL;
306 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
311 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
313 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
314 os_memcmp(ssid->passphrase, value, len) == 0)
317 os_free(ssid->passphrase);
318 ssid->passphrase = os_malloc(len + 1);
319 if (ssid->passphrase
[all...]
H A Dwps_supplicant.c397 os_free(ssid->passphrase);
398 ssid->passphrase = os_malloc(cred->key_len + 1);
399 if (ssid->passphrase == NULL)
401 os_memcpy(ssid->passphrase, cred->key, cred->key_len);
402 ssid->passphrase[cred->key_len] = '\0';
1640 if (ssid->passphrase) {
1641 cred.key_len = os_strlen(ssid->passphrase);
1644 os_memcpy(cred.key, ssid->passphrase, cred.key_len);
/freebsd-10.0-release/sys/geom/eli/
H A Dpkcs5v2.h32 size_t saltsize, const char *passphrase, u_int iterations);
H A Dpkcs5v2.c53 size_t saltsize, const char *passphrase, u_int iterations)
60 passlen = strlen(passphrase);
73 g_eli_crypto_hmac(passphrase, passlen, saltcount,
78 g_eli_crypto_hmac(passphrase, passlen, md, sizeof(md),
93 uint8_t passphrase[] = "passphrase"; local
98 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase,
52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
H A Dg_eli.c72 "Number of tries for entering the passphrase");
77 "Visibility of passphrase prompt (0 = invisible, 1 = visible, 2 = asterisk)");
1026 char passphrase[256]; local
1061 /* If there is no passphrase, we try only once. */
1064 /* Ask for the passphrase no more than g_eli_tries times. */
1078 * No key files and no passphrase, something is
1081 * that there was really no passphrase and in that case
1090 /* Ask for the passphrase if defined. */
1092 printf("Enter passphrase for %s: ", pp->name);
1093 cngets(passphrase, sizeo
[all...]
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
H A Dcrypto_openssl.c681 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
685 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase),
690 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
/freebsd-10.0-release/crypto/openssh/contrib/
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase
[all...]
/freebsd-10.0-release/crypto/openssh/contrib/cygwin/
H A Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
/freebsd-10.0-release/crypto/openssh/
H A Dauthfile.c7 * for reading the passphrase from the user.
80 * passphrase. The identification of the blob (lowest 64 bits of n) will
82 * passphrase.
85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, argument
96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
99 cipher_num = (strcmp(passphrase, "") == 0) ?
107 /* Put checkbytes for checking passphrase validity. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
184 error("passphrase to
241 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument
258 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument
418 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument
519 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument
596 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument
641 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument
660 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument
698 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument
721 key_load_private(const char *filename, const char *passphrase, char **commentp) argument
845 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument
[all...]
H A Dsshconnect1.c210 char buf[300], *passphrase, *comment, *authfile; local
251 * load the private key. Try first with empty passphrase; if it
252 * fails, ask for a passphrase.
261 "Enter passphrase for RSA key '%.100s': ", comment);
263 passphrase = read_passphrase(buf, 0);
264 if (strcmp(passphrase, "") != 0) {
266 authfile, passphrase, NULL, NULL);
269 debug2("no passphrase given, try next key");
272 memset(passphrase, 0, strlen(passphrase));
[all...]
H A Dssh-keygen.c64 * Flag indicating that we just want to change the passphrase. This can be
97 /* This is set to the passphrase if given on the command line. */
100 /* This is set to the new passphrase if given on the command line. */
251 pass = read_passphrase("Enter passphrase: ",
1212 * Perform changing a passphrase. The argument is the passwd structure
1229 /* Try to load the file with empty passphrase. */
1236 read_passphrase("Enter old passphrase: ",
1243 printf("Bad passphrase.\n");
1249 /* Ask the new passphrase (twice). */
1255 read_passphrase("Enter new passphrase (empt
1331 char new_comment[1024], *comment, *passphrase; local
[all...]
H A Dcipher.c392 * passphrase and using the resulting 16 bytes as the key.
397 const char *passphrase, int do_encrypt)
403 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
396 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument
H A Dsshconnect2.c1349 char prompt[300], *passphrase; local
1368 "Enter passphrase for key '%.100s': ", filename);
1370 passphrase = read_passphrase(prompt, 0);
1371 if (strcmp(passphrase, "") != 0) {
1373 filename, passphrase, NULL, NULL);
1376 debug2("no passphrase given, try next key");
1379 memset(passphrase, 0, strlen(passphrase));
1380 free(passphrase);
1383 debug2("bad passphrase give
[all...]
/freebsd-10.0-release/contrib/subversion/subversion/include/private/
H A Dsvn_auth_private.h153 certificate passphrase credential cache store identified by
154 PASSTYPE. PASSPHRASE_GET is used to obtain the passphrase value.
158 several of the ssl client passphrase credential providers (the
172 client certificate passphrase credential cache store identified by
192 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS;
196 const char **passphrase,
211 const char *passphrase,
/freebsd-10.0-release/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.c75 static const char *pam_ssh_prompt = "SSH passphrase: ";
92 * directory, using the specified passphrase. If successful, returns a
96 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, argument
108 * If the key is unencrypted, OpenSSL ignores the passphrase, so
110 * a user to circumvent nullok by providing a dummy passphrase.
112 * with an empty passphrase, and if the key is not encrypted,
113 * accept only an empty passphrase.
116 if (key != NULL && !(*passphrase == '\0' && nullok)) {
121 key = key_load_private(fn, passphrase, &comment);
157 const char **kfn, *passphrase, *use local
[all...]
/freebsd-10.0-release/contrib/apr-util/include/private/
H A Dapr_crypto_internal.h83 * @brief Create a key from the given passphrase. By default, the PBKDF2
84 * algorithm is used to generate the key from the passphrase. It is expected
94 * @param pass The passphrase to use.
95 * @param passLen The passphrase length in bytes
110 apr_status_t (*passphrase)(apr_crypto_key_t **key, apr_size_t *ivSize, member in struct:apr_crypto_driver_t
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/
H A Dssl_client_cert_pw_providers.c46 * AUTHN_PASSTYPE_KEY just records the passphrase type next to the
47 * passphrase, so that anyone who is manually editing their authn
50 #define AUTHN_PASSPHRASE_KEY "passphrase"
53 /* Baton type for the ssl client cert passphrase provider. */
66 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS;
70 const char **passphrase,
82 *passphrase = str->data;
97 const char *passphrase,
103 svn_string_create(passphrase, pool));
136 /* Try to load passphrase fro
68 svn_auth__ssl_client_cert_pw_get(svn_boolean_t *done, const char **passphrase, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
92 svn_auth__ssl_client_cert_pw_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *passphrase, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
[all...]
/freebsd-10.0-release/contrib/wpa/src/ap/
H A Dieee802_11_auth.c424 char *passphrase, *strpassphrase; local
432 passphrase = radius_msg_get_tunnel_password(
439 if (passphrase == NULL)
442 * passphrase does not contain the NULL termination.
448 os_memcpy(strpassphrase, passphrase, passphraselen);
459 os_free(passphrase);
/freebsd-10.0-release/crypto/openssh/contrib/suse/
H A Dopenssh.spec42 Summary: A passphrase dialog for OpenSSH and the X window System.
77 This package contains an X Window System passphrase dialog for OpenSSH.

Completed in 176 milliseconds

12