/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 25 char *ssid, *passphrase, buf[64], *pos; local 28 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 29 "\nIf passphrase is left out, it will be read from " 37 passphrase = argv[2]; 39 printf("# reading passphrase from stdin\n"); 41 printf("Failed to read passphrase\n"); 53 passphrase = buf; 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | config_ssid.h | 131 * passphrase - WPA ASCII passphrase 133 * If this is set, psk will be generated using the SSID and passphrase 134 * configured for the network. ASCII passphrase must be between 8 and 137 char *passphrase; member in struct:wpa_ssid 281 * be set (either directly or using ASCII passphrase).
|
H A D | config.c | 337 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 342 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 344 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 345 os_memcmp(ssid->passphrase, value, len) == 0) 348 os_free(ssid->passphrase); 349 ssid->passphrase = os_malloc(len + 1); 350 if (ssid->passphrase == NULL) 352 os_memcpy(ssid->passphrase, value, len); 353 ssid->passphrase[le [all...] |
H A D | wps_supplicant.c | 345 os_free(ssid->passphrase); 346 ssid->passphrase = os_malloc(cred->key_len + 1); 347 if (ssid->passphrase == NULL) 349 os_memcpy(ssid->passphrase, cred->key, cred->key_len); 350 ssid->passphrase[cred->key_len] = '\0';
|
H A D | ap.c | 83 if (ssid->passphrase) { 84 bss->ssid.wpa_passphrase = os_strdup(ssid->passphrase);
|
H A D | wpa_supplicant.c | 1205 params.passphrase = ssid->passphrase;
|
/freebsd-9.3-release/sys/geom/eli/ |
H A D | pkcs5v2.h | 32 size_t saltsize, const char *passphrase, u_int iterations);
|
H A D | pkcs5v2.c | 53 size_t saltsize, const char *passphrase, u_int iterations) 60 passlen = strlen(passphrase); 73 g_eli_crypto_hmac(passphrase, passlen, saltcount, 78 g_eli_crypto_hmac(passphrase, passlen, md, sizeof(md), 93 uint8_t passphrase[] = "passphrase"; local 98 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase, 52 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
|
H A D | g_eli.c | 72 "Number of tries for entering the passphrase"); 77 "Visibility of passphrase prompt (0 = invisible, 1 = visible, 2 = asterisk)"); 1020 char passphrase[256]; local 1055 /* If there is no passphrase, we try only once. */ 1058 /* Ask for the passphrase no more than g_eli_tries times. */ 1072 * No key files and no passphrase, something is 1075 * that there was really no passphrase and in that case 1084 /* Ask for the passphrase if defined. */ 1086 printf("Enter passphrase for %s: ", pp->name); 1087 cngets(passphrase, sizeo [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | sha1-pbkdf2.c | 22 static int pbkdf2_sha1_f(const char *passphrase, const char *ssid, argument 31 size_t passphrase_len = os_strlen(passphrase); 48 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 54 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 68 * @passphrase: ASCII passphrase 80 int pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, argument 90 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | sha1.h | 31 int pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len,
|
/freebsd-9.3-release/etc/rc.d/ |
H A D | encswap | 24 passphrase=`dd if=/dev/random count=1 2>/dev/null | md5 -q` 26 gbde init "${device}" -P "${passphrase}" || return 1 27 gbde attach "${device}" -p "${passphrase}" || return 1
|
/freebsd-9.3-release/crypto/openssh/contrib/ |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
/freebsd-9.3-release/crypto/openssh/ |
H A D | authfile.c | 7 * for reading the passphrase from the user. 95 key_private_to_blob2(Key *prv, Buffer *blob, const char *passphrase, argument 109 if (passphrase == NULL || !strlen(passphrase)) { 127 if (bcrypt_pbkdf(passphrase, strlen(passphrase), 203 key_parse_private2(Buffer *blob, int type, const char *passphrase, argument 277 if ((passphrase == NULL || !strlen(passphrase)) && 279 /* passphrase require 428 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument 518 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 585 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument 610 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument 772 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument 874 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument 951 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument 996 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument 1022 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument 1060 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument 1083 key_load_private(const char *filename, const char *passphrase, char **commentp) argument 1207 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument [all...] |
H A D | sshconnect1.c | 212 char buf[300], *passphrase, *comment, *authfile; local 253 * load the private key. Try first with empty passphrase; if it 254 * fails, ask for a passphrase. 263 "Enter passphrase for RSA key '%.100s': ", comment); 265 passphrase = read_passphrase(buf, 0); 266 if (strcmp(passphrase, "") != 0) { 268 authfile, passphrase, NULL, NULL); 271 debug2("no passphrase given, try next key"); 274 explicit_bzero(passphrase, strlen(passphrase)); [all...] |
H A D | ssh-keygen.c | 64 * Flag indicating that we just want to change the passphrase. This can be 97 /* This is set to the passphrase if given on the command line. */ 100 /* This is set to the new passphrase if given on the command line. */ 267 pass = read_passphrase("Enter passphrase: ", 1233 * Perform changing a passphrase. The argument is the passwd structure 1250 /* Try to load the file with empty passphrase. */ 1257 read_passphrase("Enter old passphrase: ", 1264 printf("Bad passphrase.\n"); 1270 /* Ask the new passphrase (twice). */ 1276 read_passphrase("Enter new passphrase (empt 1353 char new_comment[1024], *comment, *passphrase; local [all...] |
H A D | cipher.c | 437 * passphrase and using the resulting 16 bytes as the key. 442 const char *passphrase, int do_encrypt) 446 if (ssh_digest_memory(SSH_DIGEST_MD5, passphrase, strlen(passphrase), 441 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument
|
H A D | sshconnect2.c | 1136 char prompt[300], *passphrase; local 1155 "Enter passphrase for key '%.100s': ", filename); 1157 passphrase = read_passphrase(prompt, 0); 1158 if (strcmp(passphrase, "") != 0) { 1160 filename, passphrase, NULL, NULL); 1163 debug2("no passphrase given, try next key"); 1166 explicit_bzero(passphrase, strlen(passphrase)); 1167 free(passphrase); 1170 debug2("bad passphrase give [all...] |
/freebsd-9.3-release/crypto/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/freebsd-9.3-release/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 75 static const char *pam_ssh_prompt = "SSH passphrase: "; 92 * directory, using the specified passphrase. If successful, returns a 96 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, argument 108 * If the key is unencrypted, OpenSSL ignores the passphrase, so 110 * a user to circumvent nullok by providing a dummy passphrase. 112 * with an empty passphrase, and if the key is not encrypted, 113 * accept only an empty passphrase. 116 if (key != NULL && !(*passphrase == '\0' && nullok)) { 121 key = key_load_private(fn, passphrase, &comment); 157 const char **kfn, *passphrase, *use local [all...] |
/freebsd-9.3-release/crypto/heimdal/tools/ |
H A D | heimdal-build.sh | 108 --passphrase) 279 autobuild-passphrase: ${passhrase}
|
/freebsd-9.3-release/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 42 Summary: A passphrase dialog for OpenSSH and the X window System. 77 This package contains an X Window System passphrase dialog for OpenSSH.
|
/freebsd-9.3-release/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 123 Summary: A passphrase dialog for OpenSSH and X. 129 Summary: A passphrase dialog for OpenSSH, X, and GNOME. 165 an X11 passphrase dialog for OpenSSH. 170 an X11 passphrase dialog for OpenSSH and the GNOME GUI desktop
|
/freebsd-9.3-release/contrib/wpa/src/drivers/ |
H A D | driver.h | 427 * passphrase - RSN passphrase for PSK 431 * the 8..63 character ASCII passphrase, if available. Please note that 432 * this can be %NULL if passphrase was not used to generate the PSK. In 435 const char *passphrase; member in struct:wpa_driver_associate_params 438 * psk - RSN PSK (alternative for passphrase for PSK)
|