Searched refs:passphrase (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-9.3-release/contrib/wpa/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
25 char *ssid, *passphrase, buf[64], *pos; local
28 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
29 "\nIf passphrase is left out, it will be read from "
37 passphrase = argv[2];
39 printf("# reading passphrase from stdin\n");
41 printf("Failed to read passphrase\n");
53 passphrase = buf;
56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6
[all...]
H A Dconfig_ssid.h131 * passphrase - WPA ASCII passphrase
133 * If this is set, psk will be generated using the SSID and passphrase
134 * configured for the network. ASCII passphrase must be between 8 and
137 char *passphrase; member in struct:wpa_ssid
281 * be set (either directly or using ASCII passphrase).
H A Dconfig.c337 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
342 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
344 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
345 os_memcmp(ssid->passphrase, value, len) == 0)
348 os_free(ssid->passphrase);
349 ssid->passphrase = os_malloc(len + 1);
350 if (ssid->passphrase == NULL)
352 os_memcpy(ssid->passphrase, value, len);
353 ssid->passphrase[le
[all...]
H A Dwps_supplicant.c345 os_free(ssid->passphrase);
346 ssid->passphrase = os_malloc(cred->key_len + 1);
347 if (ssid->passphrase == NULL)
349 os_memcpy(ssid->passphrase, cred->key, cred->key_len);
350 ssid->passphrase[cred->key_len] = '\0';
H A Dap.c83 if (ssid->passphrase) {
84 bss->ssid.wpa_passphrase = os_strdup(ssid->passphrase);
H A Dwpa_supplicant.c1205 params.passphrase = ssid->passphrase;
/freebsd-9.3-release/sys/geom/eli/
H A Dpkcs5v2.h32 size_t saltsize, const char *passphrase, u_int iterations);
H A Dpkcs5v2.c53 size_t saltsize, const char *passphrase, u_int iterations)
60 passlen = strlen(passphrase);
73 g_eli_crypto_hmac(passphrase, passlen, saltcount,
78 g_eli_crypto_hmac(passphrase, passlen, md, sizeof(md),
93 uint8_t passphrase[] = "passphrase"; local
98 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase,
52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
H A Dg_eli.c72 "Number of tries for entering the passphrase");
77 "Visibility of passphrase prompt (0 = invisible, 1 = visible, 2 = asterisk)");
1020 char passphrase[256]; local
1055 /* If there is no passphrase, we try only once. */
1058 /* Ask for the passphrase no more than g_eli_tries times. */
1072 * No key files and no passphrase, something is
1075 * that there was really no passphrase and in that case
1084 /* Ask for the passphrase if defined. */
1086 printf("Enter passphrase for %s: ", pp->name);
1087 cngets(passphrase, sizeo
[all...]
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dsha1-pbkdf2.c22 static int pbkdf2_sha1_f(const char *passphrase, const char *ssid, argument
31 size_t passphrase_len = os_strlen(passphrase);
48 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
54 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
68 * @passphrase: ASCII passphrase
80 int pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, argument
90 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h31 int pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len,
/freebsd-9.3-release/etc/rc.d/
H A Dencswap24 passphrase=`dd if=/dev/random count=1 2>/dev/null | md5 -q`
26 gbde init "${device}" -P "${passphrase}" || return 1
27 gbde attach "${device}" -p "${passphrase}" || return 1
/freebsd-9.3-release/crypto/openssh/contrib/
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase
[all...]
/freebsd-9.3-release/crypto/openssh/
H A Dauthfile.c7 * for reading the passphrase from the user.
95 key_private_to_blob2(Key *prv, Buffer *blob, const char *passphrase, argument
109 if (passphrase == NULL || !strlen(passphrase)) {
127 if (bcrypt_pbkdf(passphrase, strlen(passphrase),
203 key_parse_private2(Buffer *blob, int type, const char *passphrase, argument
277 if ((passphrase == NULL || !strlen(passphrase)) &&
279 /* passphrase require
428 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument
518 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
585 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument
610 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument
772 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument
874 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument
951 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument
996 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument
1022 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument
1060 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument
1083 key_load_private(const char *filename, const char *passphrase, char **commentp) argument
1207 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument
[all...]
H A Dsshconnect1.c212 char buf[300], *passphrase, *comment, *authfile; local
253 * load the private key. Try first with empty passphrase; if it
254 * fails, ask for a passphrase.
263 "Enter passphrase for RSA key '%.100s': ", comment);
265 passphrase = read_passphrase(buf, 0);
266 if (strcmp(passphrase, "") != 0) {
268 authfile, passphrase, NULL, NULL);
271 debug2("no passphrase given, try next key");
274 explicit_bzero(passphrase, strlen(passphrase));
[all...]
H A Dssh-keygen.c64 * Flag indicating that we just want to change the passphrase. This can be
97 /* This is set to the passphrase if given on the command line. */
100 /* This is set to the new passphrase if given on the command line. */
267 pass = read_passphrase("Enter passphrase: ",
1233 * Perform changing a passphrase. The argument is the passwd structure
1250 /* Try to load the file with empty passphrase. */
1257 read_passphrase("Enter old passphrase: ",
1264 printf("Bad passphrase.\n");
1270 /* Ask the new passphrase (twice). */
1276 read_passphrase("Enter new passphrase (empt
1353 char new_comment[1024], *comment, *passphrase; local
[all...]
H A Dcipher.c437 * passphrase and using the resulting 16 bytes as the key.
442 const char *passphrase, int do_encrypt)
446 if (ssh_digest_memory(SSH_DIGEST_MD5, passphrase, strlen(passphrase),
441 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument
H A Dsshconnect2.c1136 char prompt[300], *passphrase; local
1155 "Enter passphrase for key '%.100s': ", filename);
1157 passphrase = read_passphrase(prompt, 0);
1158 if (strcmp(passphrase, "") != 0) {
1160 filename, passphrase, NULL, NULL);
1163 debug2("no passphrase given, try next key");
1166 explicit_bzero(passphrase, strlen(passphrase));
1167 free(passphrase);
1170 debug2("bad passphrase give
[all...]
/freebsd-9.3-release/crypto/openssh/contrib/cygwin/
H A Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
/freebsd-9.3-release/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.c75 static const char *pam_ssh_prompt = "SSH passphrase: ";
92 * directory, using the specified passphrase. If successful, returns a
96 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, argument
108 * If the key is unencrypted, OpenSSL ignores the passphrase, so
110 * a user to circumvent nullok by providing a dummy passphrase.
112 * with an empty passphrase, and if the key is not encrypted,
113 * accept only an empty passphrase.
116 if (key != NULL && !(*passphrase == '\0' && nullok)) {
121 key = key_load_private(fn, passphrase, &comment);
157 const char **kfn, *passphrase, *use local
[all...]
/freebsd-9.3-release/crypto/heimdal/tools/
H A Dheimdal-build.sh108 --passphrase)
279 autobuild-passphrase: ${passhrase}
/freebsd-9.3-release/crypto/openssh/contrib/suse/
H A Dopenssh.spec42 Summary: A passphrase dialog for OpenSSH and the X window System.
77 This package contains an X Window System passphrase dialog for OpenSSH.
/freebsd-9.3-release/crypto/openssh/contrib/redhat/
H A Dopenssh.spec123 Summary: A passphrase dialog for OpenSSH and X.
129 Summary: A passphrase dialog for OpenSSH, X, and GNOME.
165 an X11 passphrase dialog for OpenSSH.
170 an X11 passphrase dialog for OpenSSH and the GNOME GUI desktop
/freebsd-9.3-release/contrib/wpa/src/drivers/
H A Ddriver.h427 * passphrase - RSN passphrase for PSK
431 * the 8..63 character ASCII passphrase, if available. Please note that
432 * this can be %NULL if passphrase was not used to generate the PSK. In
435 const char *passphrase; member in struct:wpa_driver_associate_params
438 * psk - RSN PSK (alternative for passphrase for PSK)

Completed in 427 milliseconds

12