/freebsd-10.1-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | config_ssid.h | 136 * passphrase - WPA ASCII passphrase 138 * If this is set, psk will be generated using the SSID and passphrase 139 * configured for the network. ASCII passphrase must be between 8 and 142 char *passphrase; member in struct:wpa_ssid 145 * ext_psk - PSK/passphrase name in external storage 147 * If this is set, PSK/passphrase will be fetched from external storage 310 * be set (either directly or using ASCII passphrase).
|
H A D | p2p_supplicant.c | 458 if (ssid->passphrase && !s->passphrase) 460 else if (ssid->passphrase && s->passphrase && 461 os_strcmp(ssid->passphrase, s->passphrase) != 0) 494 if (ssid->passphrase) { 495 os_free(s->passphrase); 496 s->passphrase = os_strdup(ssid->passphrase); [all...] |
H A D | config.c | 281 os_free(ssid->passphrase); 282 ssid->passphrase = NULL; 306 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 311 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 313 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 314 os_memcmp(ssid->passphrase, value, len) == 0) 317 os_free(ssid->passphrase); 318 ssid->passphrase = os_malloc(len + 1); 319 if (ssid->passphrase [all...] |
H A D | wps_supplicant.c | 397 os_free(ssid->passphrase); 398 ssid->passphrase = os_malloc(cred->key_len + 1); 399 if (ssid->passphrase == NULL) 401 os_memcpy(ssid->passphrase, cred->key, cred->key_len); 402 ssid->passphrase[cred->key_len] = '\0'; 1640 if (ssid->passphrase) { 1641 cred.key_len = os_strlen(ssid->passphrase); 1644 os_memcpy(cred.key, ssid->passphrase, cred.key_len);
|
/freebsd-10.1-release/sys/geom/eli/ |
H A D | pkcs5v2.h | 32 size_t saltsize, const char *passphrase, u_int iterations);
|
H A D | pkcs5v2.c | 53 size_t saltsize, const char *passphrase, u_int iterations) 60 passlen = strlen(passphrase); 73 g_eli_crypto_hmac(passphrase, passlen, saltcount, 78 g_eli_crypto_hmac(passphrase, passlen, md, sizeof(md), 93 uint8_t passphrase[] = "passphrase"; local 98 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase, 52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
|
H A D | g_eli.c | 72 "Number of tries for entering the passphrase"); 77 "Visibility of passphrase prompt (0 = invisible, 1 = visible, 2 = asterisk)"); 93 * there are multiple providers using the same passphrase. 1044 char passphrase[256]; local 1079 /* If there is no passphrase, we try only once. */ 1082 /* Ask for the passphrase no more than g_eli_tries times. */ 1096 * No key files and no passphrase, something is 1099 * that there was really no passphrase and in that case 1108 /* Ask for the passphrase if defined. */ 1110 /* Try first with cached passphrase [all...] |
/freebsd-10.1-release/contrib/wpa/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
H A D | crypto_openssl.c | 681 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 685 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), 690 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/freebsd-10.1-release/crypto/openssh/contrib/ |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
/freebsd-10.1-release/crypto/openssh/ |
H A D | authfile.c | 7 * for reading the passphrase from the user. 95 key_private_to_blob2(Key *prv, Buffer *blob, const char *passphrase, argument 109 if (passphrase == NULL || !strlen(passphrase)) { 127 if (bcrypt_pbkdf(passphrase, strlen(passphrase), 203 key_parse_private2(Buffer *blob, int type, const char *passphrase, argument 277 if ((passphrase == NULL || !strlen(passphrase)) && 279 /* passphrase require 428 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument 518 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 585 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument 610 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument 772 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument 874 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument 951 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument 996 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument 1022 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument 1060 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument 1083 key_load_private(const char *filename, const char *passphrase, char **commentp) argument 1207 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument [all...] |
H A D | sshconnect1.c | 212 char buf[300], *passphrase, *comment, *authfile; local 253 * load the private key. Try first with empty passphrase; if it 254 * fails, ask for a passphrase. 263 "Enter passphrase for RSA key '%.100s': ", comment); 265 passphrase = read_passphrase(buf, 0); 266 if (strcmp(passphrase, "") != 0) { 268 authfile, passphrase, NULL, NULL); 271 debug2("no passphrase given, try next key"); 274 explicit_bzero(passphrase, strlen(passphrase)); [all...] |
H A D | ssh-keygen.c | 64 * Flag indicating that we just want to change the passphrase. This can be 97 /* This is set to the passphrase if given on the command line. */ 100 /* This is set to the new passphrase if given on the command line. */ 267 pass = read_passphrase("Enter passphrase: ", 1233 * Perform changing a passphrase. The argument is the passwd structure 1250 /* Try to load the file with empty passphrase. */ 1257 read_passphrase("Enter old passphrase: ", 1264 printf("Bad passphrase.\n"); 1270 /* Ask the new passphrase (twice). */ 1276 read_passphrase("Enter new passphrase (empt 1353 char new_comment[1024], *comment, *passphrase; local [all...] |
H A D | cipher.c | 436 * passphrase and using the resulting 16 bytes as the key. 441 const char *passphrase, int do_encrypt) 445 if (ssh_digest_memory(SSH_DIGEST_MD5, passphrase, strlen(passphrase), 440 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument
|
H A D | sshconnect2.c | 1135 char prompt[300], *passphrase; local 1154 "Enter passphrase for key '%.100s': ", filename); 1156 passphrase = read_passphrase(prompt, 0); 1157 if (strcmp(passphrase, "") != 0) { 1159 filename, passphrase, NULL, NULL); 1162 debug2("no passphrase given, try next key"); 1165 explicit_bzero(passphrase, strlen(passphrase)); 1166 free(passphrase); 1169 debug2("bad passphrase give [all...] |
/freebsd-10.1-release/crypto/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/freebsd-10.1-release/contrib/subversion/subversion/include/private/ |
H A D | svn_auth_private.h | 171 certificate passphrase credential cache store identified by 172 PASSTYPE. PASSPHRASE_GET is used to obtain the passphrase value. 176 several of the ssl client passphrase credential providers (the 190 client certificate passphrase credential cache store identified by 210 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS; 214 const char **passphrase, 229 const char *passphrase,
|
/freebsd-10.1-release/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 75 static const char *pam_ssh_prompt = "SSH passphrase: "; 92 * directory, using the specified passphrase. If successful, returns a 96 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, argument 108 * If the key is unencrypted, OpenSSL ignores the passphrase, so 110 * a user to circumvent nullok by providing a dummy passphrase. 112 * with an empty passphrase, and if the key is not encrypted, 113 * accept only an empty passphrase. 116 if (key != NULL && !(*passphrase == '\0' && nullok)) { 121 key = key_load_private(fn, passphrase, &comment); 157 const char **kfn, *passphrase, *use local [all...] |
/freebsd-10.1-release/contrib/apr-util/include/private/ |
H A D | apr_crypto_internal.h | 83 * @brief Create a key from the given passphrase. By default, the PBKDF2 84 * algorithm is used to generate the key from the passphrase. It is expected 94 * @param pass The passphrase to use. 95 * @param passLen The passphrase length in bytes 110 apr_status_t (*passphrase)(apr_crypto_key_t **key, apr_size_t *ivSize, member in struct:apr_crypto_driver_t
|
/freebsd-10.1-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | ssl_client_cert_pw_providers.c | 46 * AUTHN_PASSTYPE_KEY just records the passphrase type next to the 47 * passphrase, so that anyone who is manually editing their authn 50 #define AUTHN_PASSPHRASE_KEY "passphrase" 53 /* Baton type for the ssl client cert passphrase provider. */ 66 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS; 70 const char **passphrase, 82 *passphrase = str->data; 97 const char *passphrase, 103 svn_string_create(passphrase, pool)); 136 /* Try to load passphrase fro 68 svn_auth__ssl_client_cert_pw_get(svn_boolean_t *done, const char **passphrase, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 92 svn_auth__ssl_client_cert_pw_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *passphrase, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument [all...] |
/freebsd-10.1-release/contrib/wpa/src/ap/ |
H A D | ieee802_11_auth.c | 424 char *passphrase, *strpassphrase; local 432 passphrase = radius_msg_get_tunnel_password( 439 if (passphrase == NULL) 442 * passphrase does not contain the NULL termination. 448 os_memcpy(strpassphrase, passphrase, passphraselen); 459 os_free(passphrase);
|
/freebsd-10.1-release/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 42 Summary: A passphrase dialog for OpenSSH and the X window System. 77 This package contains an X Window System passphrase dialog for OpenSSH.
|