/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 23 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 24 "\nIf passphrase is left out, it will be read from " 32 passphrase = argv[2]; 34 printf("# reading passphrase from stdin\n"); 36 printf("Failed to read passphrase\n"); 48 passphrase = buf; 51 len = os_strlen(passphrase); 56 if (has_ctrl_char((u8 *) passphrase, le [all...] |
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_write_set_passphrase.c | 44 "Empty passphrase is unacceptable"); 47 free(a->passphrase); 48 a->passphrase = strdup(p); 49 if (a->passphrase == NULL) { 51 "Can't allocate data for passphrase"); 77 if (a->passphrase != NULL) 78 return (a->passphrase); 85 a->passphrase = strdup(p); 86 if (a->passphrase == NULL) { 88 "Can't allocate data for passphrase"); [all...] |
H A D | archive_read_add_passphrase.c | 67 new_read_passphrase(struct archive_read *a, const char *passphrase) argument 77 p->passphrase = strdup(passphrase); 78 if (p->passphrase == NULL) { 88 archive_read_add_passphrase(struct archive *_a, const char *passphrase) argument 96 if (passphrase == NULL || passphrase[0] == '\0') { 98 "Empty passphrase is unacceptable"); 102 p = new_read_passphrase(a, passphrase); 125 * Call this in advance when you start to get a passphrase fo 142 const char *passphrase; local [all...] |
H A D | archive_write.c | 467 /* Clear passphrase. */ 468 if (a->passphrase != NULL) { 469 memset(a->passphrase, 0, strlen(a->passphrase)); 470 free(a->passphrase); 471 a->passphrase = NULL; 695 if (a->passphrase != NULL) { 696 /* A passphrase should be cleaned. */ 697 memset(a->passphrase, 0, strlen(a->passphrase)); [all...] |
H A D | archive_write_private.h | 129 * Encryption passphrase. 131 char *passphrase; member in struct:archive_write 162 * Get a encryption passphrase.
|
/freebsd-11-stable/sys/geom/eli/ |
H A D | pkcs5v2.h | 32 size_t saltsize, const char *passphrase, u_int iterations);
|
H A D | pkcs5v2.c | 53 size_t saltsize, const char *passphrase, u_int iterations) 61 passlen = strlen(passphrase); 72 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen); 98 uint8_t passphrase[] = "passphrase"; local 103 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase, 52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/freebsd-11-stable/crypto/openssh/contrib/ |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 88 char *passphrase, *local; local 168 /* Report passphrase if user selected OK */ 169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 171 local = g_locale_from_utf8(passphrase, strlen(passphrase), 178 puts(passphrase); 182 /* Zero passphrase in memory */ 183 memset(passphrase, '\b', strlen(passphrase)); 184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | authfile.h | 46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
|
H A D | key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, argument 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, 360 key_load_private(const char *path, const char *passphrase, argument 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { 380 key_load_private_cert(int type, const char *filename, const char *passphrase, argument 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, 401 key_load_private_type(int type, const char *filename, const char *passphrase, argument 407 if ((r = sshkey_load_private_type(type, filename, passphrase,
|
H A D | authfile.c | 77 const char *passphrase, const char *comment, 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, 211 sshkey_load_private_type(int type, const char *filename, const char *passphrase, argument 235 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); 242 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, argument 256 passphrase, keyp, commentp)) != 0) 268 sshkey_load_private(const char *filename, const char *passphrase, argument 291 (r = sshkey_parse_private_fileblob(buffer, passphrase, keyp, 453 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, argument 476 passphrase, 76 sshkey_save_private(struct sshkey *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument [all...] |
H A D | sshconnect1.c | 224 char buf[300], *passphrase = NULL, *comment, *authfile; local 265 * load the private key. Try first with empty passphrase; if it 266 * fails, ask for a passphrase. 275 "Enter passphrase for RSA key '%.100s': ", comment); 277 passphrase = read_passphrase(buf, 0); 278 if (strcmp(passphrase, "") != 0) { 280 authfile, passphrase, NULL, NULL); 283 debug2("no passphrase given, try next key"); 288 debug2("bad passphrase given, try again..."); 293 maybe_add_key_to_agent(authfile, private, comment, passphrase); [all...] |
H A D | sshkey.h | 186 const char *passphrase, const char *comment, 191 const char *passphrase, struct sshkey **keyp, char **commentp); 193 const char *passphrase, struct sshkey **keyp, char **commentp);
|
/freebsd-11-stable/usr.bin/cpio/ |
H A D | Makefile | 16 SRCS+= err.c line_reader.c passphrase.c
|
/freebsd-11-stable/crypto/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/freebsd-11-stable/usr.bin/tar/ |
H A D | Makefile | 22 passphrase.c
|
/freebsd-11-stable/contrib/libarchive/cpio/ |
H A D | cpio.h | 76 const char *passphrase; member in struct:cpio
|
/freebsd-11-stable/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 76 static const char *pam_ssh_prompt = "SSH passphrase: "; 95 * directory, using the specified passphrase. If successful, returns a 99 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, argument 111 * If the key is unencrypted, OpenSSL ignores the passphrase, so 113 * a user to circumvent nullok by providing a dummy passphrase. 115 * with an empty passphrase, and if the key is not encrypted, 116 * accept only an empty passphrase. 119 if (key != NULL && !(*passphrase == '\0' && nullok)) { 124 key = key_load_private(fn, passphrase, &comment); 160 const char **kfn, *passphrase, *use local [all...] |
/freebsd-11-stable/contrib/subversion/subversion/include/private/ |
H A D | svn_auth_private.h | 171 certificate passphrase credential cache store identified by 172 PASSTYPE. PASSPHRASE_GET is used to obtain the passphrase value. 176 several of the ssl client passphrase credential providers (the 190 client certificate passphrase credential cache store identified by 210 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS; 214 const char **passphrase, 229 const char *passphrase,
|
/freebsd-11-stable/stand/libsa/geli/ |
H A D | geliboot.c | 219 * prompt for a passphrase if there are no existing keys that work. 222 geli_probe(struct geli_dev *gdev, const char *passphrase, u_char *mkeyp) argument 241 * Prepare Derived-Key from the user passphrase. 249 g_eli_crypto_hmac_update(&ctx, (const uint8_t *)passphrase, 250 strlen(passphrase)); 257 sizeof(gdev->md.md_salt), passphrase, 382 /* Try cached passphrase */
|
/freebsd-11-stable/contrib/apr-util/include/private/ |
H A D | apr_crypto_internal.h | 83 * @brief Create a key from the given passphrase. By default, the PBKDF2 84 * algorithm is used to generate the key from the passphrase. It is expected 94 * @param pass The passphrase to use. 95 * @param passLen The passphrase length in bytes 110 apr_status_t (*passphrase)(apr_crypto_key_t **key, apr_size_t *ivSize, member in struct:apr_crypto_driver_t 271 * @brief Create a key from the provided secret or passphrase. The key is cleaned
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | ssl_client_cert_pw_providers.c | 43 /* Baton type for the ssl client cert passphrase provider. */ 63 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS; 67 const char **passphrase, 79 *passphrase = str->data; 94 const char *passphrase, 100 svn_string_create(passphrase, pool)); 133 /* Try to load passphrase from the auth/ cache. */ 195 /* Don't store passphrase in any form if the user has told 201 /* If the passphrase is going to be stored encrypted, go right 228 to not store the passphrase */ 65 svn_auth__ssl_client_cert_pw_get(svn_boolean_t *done, const char **passphrase, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 89 svn_auth__ssl_client_cert_pw_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *passphrase, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument [all...] |