Searched refs:passphrase (Results 1 - 25 of 78) sorted by relevance

1234

/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
23 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
24 "\nIf passphrase is left out, it will be read from "
32 passphrase = argv[2];
34 printf("# reading passphrase from stdin\n");
36 printf("Failed to read passphrase\n");
48 passphrase = buf;
51 len = os_strlen(passphrase);
56 if (has_ctrl_char((u8 *) passphrase, le
[all...]
/freebsd-11-stable/contrib/libarchive/libarchive/
H A Darchive_write_set_passphrase.c44 "Empty passphrase is unacceptable");
47 free(a->passphrase);
48 a->passphrase = strdup(p);
49 if (a->passphrase == NULL) {
51 "Can't allocate data for passphrase");
77 if (a->passphrase != NULL)
78 return (a->passphrase);
85 a->passphrase = strdup(p);
86 if (a->passphrase == NULL) {
88 "Can't allocate data for passphrase");
[all...]
H A Darchive_read_add_passphrase.c67 new_read_passphrase(struct archive_read *a, const char *passphrase) argument
77 p->passphrase = strdup(passphrase);
78 if (p->passphrase == NULL) {
88 archive_read_add_passphrase(struct archive *_a, const char *passphrase) argument
96 if (passphrase == NULL || passphrase[0] == '\0') {
98 "Empty passphrase is unacceptable");
102 p = new_read_passphrase(a, passphrase);
125 * Call this in advance when you start to get a passphrase fo
142 const char *passphrase; local
[all...]
H A Darchive_write.c467 /* Clear passphrase. */
468 if (a->passphrase != NULL) {
469 memset(a->passphrase, 0, strlen(a->passphrase));
470 free(a->passphrase);
471 a->passphrase = NULL;
695 if (a->passphrase != NULL) {
696 /* A passphrase should be cleaned. */
697 memset(a->passphrase, 0, strlen(a->passphrase));
[all...]
H A Darchive_write_private.h129 * Encryption passphrase.
131 char *passphrase; member in struct:archive_write
162 * Get a encryption passphrase.
/freebsd-11-stable/sys/geom/eli/
H A Dpkcs5v2.h32 size_t saltsize, const char *passphrase, u_int iterations);
H A Dpkcs5v2.c53 size_t saltsize, const char *passphrase, u_int iterations)
61 passlen = strlen(passphrase);
72 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen);
98 uint8_t passphrase[] = "passphrase"; local
103 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase,
52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
/freebsd-11-stable/crypto/openssh/contrib/
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
88 char *passphrase, *local; local
168 /* Report passphrase if user selected OK */
169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
171 local = g_locale_from_utf8(passphrase, strlen(passphrase),
178 puts(passphrase);
182 /* Zero passphrase in memory */
183 memset(passphrase, '\b', strlen(passphrase));
184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dauthfile.h46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
H A Dkey.c294 key_save_private(Key *key, const char *filename, const char *passphrase, argument
300 if ((r = sshkey_save_private(key, filename, passphrase, comment,
360 key_load_private(const char *path, const char *passphrase, argument
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) {
380 key_load_private_cert(int type, const char *filename, const char *passphrase, argument
386 if ((r = sshkey_load_private_cert(type, filename, passphrase,
401 key_load_private_type(int type, const char *filename, const char *passphrase, argument
407 if ((r = sshkey_load_private_type(type, filename, passphrase,
H A Dauthfile.c77 const char *passphrase, const char *comment,
85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment,
211 sshkey_load_private_type(int type, const char *filename, const char *passphrase, argument
235 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp);
242 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, argument
256 passphrase, keyp, commentp)) != 0)
268 sshkey_load_private(const char *filename, const char *passphrase, argument
291 (r = sshkey_parse_private_fileblob(buffer, passphrase, keyp,
453 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, argument
476 passphrase,
76 sshkey_save_private(struct sshkey *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument
[all...]
H A Dsshconnect1.c224 char buf[300], *passphrase = NULL, *comment, *authfile; local
265 * load the private key. Try first with empty passphrase; if it
266 * fails, ask for a passphrase.
275 "Enter passphrase for RSA key '%.100s': ", comment);
277 passphrase = read_passphrase(buf, 0);
278 if (strcmp(passphrase, "") != 0) {
280 authfile, passphrase, NULL, NULL);
283 debug2("no passphrase given, try next key");
288 debug2("bad passphrase given, try again...");
293 maybe_add_key_to_agent(authfile, private, comment, passphrase);
[all...]
H A Dsshkey.h186 const char *passphrase, const char *comment,
191 const char *passphrase, struct sshkey **keyp, char **commentp);
193 const char *passphrase, struct sshkey **keyp, char **commentp);
/freebsd-11-stable/usr.bin/cpio/
H A DMakefile16 SRCS+= err.c line_reader.c passphrase.c
/freebsd-11-stable/crypto/openssh/contrib/cygwin/
H A Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
/freebsd-11-stable/usr.bin/tar/
H A DMakefile22 passphrase.c
/freebsd-11-stable/contrib/libarchive/cpio/
H A Dcpio.h76 const char *passphrase; member in struct:cpio
/freebsd-11-stable/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.c76 static const char *pam_ssh_prompt = "SSH passphrase: ";
95 * directory, using the specified passphrase. If successful, returns a
99 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, argument
111 * If the key is unencrypted, OpenSSL ignores the passphrase, so
113 * a user to circumvent nullok by providing a dummy passphrase.
115 * with an empty passphrase, and if the key is not encrypted,
116 * accept only an empty passphrase.
119 if (key != NULL && !(*passphrase == '\0' && nullok)) {
124 key = key_load_private(fn, passphrase, &comment);
160 const char **kfn, *passphrase, *use local
[all...]
/freebsd-11-stable/contrib/subversion/subversion/include/private/
H A Dsvn_auth_private.h171 certificate passphrase credential cache store identified by
172 PASSTYPE. PASSPHRASE_GET is used to obtain the passphrase value.
176 several of the ssl client passphrase credential providers (the
190 client certificate passphrase credential cache store identified by
210 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS;
214 const char **passphrase,
229 const char *passphrase,
/freebsd-11-stable/stand/libsa/geli/
H A Dgeliboot.c219 * prompt for a passphrase if there are no existing keys that work.
222 geli_probe(struct geli_dev *gdev, const char *passphrase, u_char *mkeyp) argument
241 * Prepare Derived-Key from the user passphrase.
249 g_eli_crypto_hmac_update(&ctx, (const uint8_t *)passphrase,
250 strlen(passphrase));
257 sizeof(gdev->md.md_salt), passphrase,
382 /* Try cached passphrase */
/freebsd-11-stable/contrib/apr-util/include/private/
H A Dapr_crypto_internal.h83 * @brief Create a key from the given passphrase. By default, the PBKDF2
84 * algorithm is used to generate the key from the passphrase. It is expected
94 * @param pass The passphrase to use.
95 * @param passLen The passphrase length in bytes
110 apr_status_t (*passphrase)(apr_crypto_key_t **key, apr_size_t *ivSize, member in struct:apr_crypto_driver_t
271 * @brief Create a key from the provided secret or passphrase. The key is cleaned
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/
H A Dssl_client_cert_pw_providers.c43 /* Baton type for the ssl client cert passphrase provider. */
63 Set **PASSPHRASE to the plaintext passphrase retrieved from CREDS;
67 const char **passphrase,
79 *passphrase = str->data;
94 const char *passphrase,
100 svn_string_create(passphrase, pool));
133 /* Try to load passphrase from the auth/ cache. */
195 /* Don't store passphrase in any form if the user has told
201 /* If the passphrase is going to be stored encrypted, go right
228 to not store the passphrase */
65 svn_auth__ssl_client_cert_pw_get(svn_boolean_t *done, const char **passphrase, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
89 svn_auth__ssl_client_cert_pw_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *passphrase, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
[all...]

Completed in 219 milliseconds

1234