/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 23 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 24 "\nIf passphrase is left out, it will be read from " 32 passphrase = argv[2]; 34 fprintf(stderr, "# reading passphrase from stdin\n"); 36 fprintf(stderr, "Failed to read passphrase\n"); 48 passphrase = buf; 51 len = os_strlen(passphrase); 56 if (has_ctrl_char((u8 *) passphrase, le [all...] |
/freebsd-current/crypto/openssl/demos/encode/ |
H A D | ec_encode.c | 27 * supplied passphrase. 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) argument 55 * Set passphrase if provided; needed to decrypt encrypted PEM files. 56 * If the input is not encrypted, any passphrase provided is ignored. 60 * interactive applications which do not know if a passphrase should be 63 if (passphrase != NULL) { 65 (const unsigned char *)passphrase, 66 strlen(passphrase)) == 0) { 98 * If a passphrase is supplied, the file is encrypted, otherwise 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) argument [all...] |
H A D | rsa_encode.c | 27 * supplied passphrase. 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) argument 55 * Set passphrase if provided; needed to decrypt encrypted PEM files. 56 * If the input is not encrypted, any passphrase provided is ignored. 60 * interactive applications which do not know if a passphrase should be 63 if (passphrase != NULL) { 65 (const unsigned char *)passphrase, 66 strlen(passphrase)) == 0) { 98 * If a passphrase is supplied, the file is encrypted, otherwise 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) argument [all...] |
/freebsd-current/sys/geom/eli/ |
H A D | pkcs5v2.h | 32 size_t saltsize, const char *passphrase, u_int iterations);
|
H A D | pkcs5v2.c | 52 size_t saltsize, const char *passphrase, u_int iterations) 60 passlen = strlen(passphrase); 71 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen); 97 const char passphrase[] = "passphrase"; local 102 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase, 51 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
|
/freebsd-current/contrib/libarchive/libarchive/ |
H A D | archive_read_add_passphrase.c | 66 new_read_passphrase(struct archive_read *a, const char *passphrase) argument 76 p->passphrase = strdup(passphrase); 77 if (p->passphrase == NULL) { 87 archive_read_add_passphrase(struct archive *_a, const char *passphrase) argument 95 if (passphrase == NULL || passphrase[0] == '\0') { 97 "Empty passphrase is unacceptable"); 101 p = new_read_passphrase(a, passphrase); 124 * Call this in advance when you start to get a passphrase fo 141 const char *passphrase; local [all...] |
H A D | archive_write_set_passphrase.c | 38 "Empty passphrase is unacceptable"); 41 free(a->passphrase); 42 a->passphrase = strdup(p); 43 if (a->passphrase == NULL) { 45 "Can't allocate data for passphrase"); 83 if (a->passphrase != NULL) 84 return (a->passphrase); 94 return (a->passphrase);
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/ |
H A D | zpool_split_encryption.ksh | 43 passphrase="password" 49 log_must eval "echo "$passphrase" | zpool create -O encryption=aes-256-ccm " \ 50 "-O keyformat=passphrase $TESTPOOL mirror $DEVICE1 $DEVICE2" 53 log_must eval "echo "$passphrase" | zpool split -l -R $altroot " \
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/ |
H A D | zfs_receive_raw_-d.ksh | 49 typeset passphrase="password1" 53 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 54 "-o keyformat=passphrase $TESTPOOL/$TESTFS1" 60 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/child"
|
H A D | zfs_receive_raw.ksh | 57 typeset passphrase="password" 60 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 61 "-o keyformat=passphrase $TESTPOOL/$TESTFS1" 75 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS2" 87 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/c1"
|
H A D | zfs_receive_-wR-encrypted-mix.ksh | 62 create_dataset "$src" -o encryption=on -o keyformat=passphrase 65 create_dataset "$src/u/e" -o encryption=on -o keyformat=passphrase
|
H A D | zfs_receive_raw_incremental.ksh | 33 # 6. Change the passphrase required to unlock the original filesystem 35 # 8. Verify that the required passphrase hasn't changed on the receive side 61 typeset passphrase="password" 66 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 67 "-o keyformat=passphrase $TESTPOOL/$TESTFS1" 86 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2"
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_send/ |
H A D | zfs_send_encrypted_unloaded.ksh | 48 typeset passphrase="password" 51 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 52 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
|
H A D | zfs_send_encrypted.ksh | 53 typeset passphrase="password" 57 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 58 "-o keyformat=passphrase $TESTPOOL/$TESTFS1" 61 "-o keyformat=passphrase $TESTPOOL/$TESTFS1/child"
|
H A D | zfs_send_raw.ksh | 50 typeset passphrase="password" 54 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 55 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
|
/freebsd-current/crypto/openssh/contrib/ |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 166 message = "Enter your OpenSSH passphrase [all...] |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 153 char *passphrase, *local; local 272 /* Report passphrase if user selected OK */ 274 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 276 local = g_locale_from_utf8(passphrase, 277 strlen(passphrase), NULL, NULL, NULL); 283 puts(passphrase); 286 /* Zero passphrase in memory */ 287 memset(passphrase, '\b', strlen(passphrase)); 288 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
H A D | gnome-ssh-askpass3.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 137 char *passphrase, *local; local 241 /* Report passphrase if user selected OK */ 243 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 245 local = g_locale_from_utf8(passphrase, 246 strlen(passphrase), NULL, NULL, NULL); 252 puts(passphrase); 255 /* Zero passphrase in memory */ 256 memset(passphrase, '\b', strlen(passphrase)); 257 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
H A D | send_mixed_raw.ksh | 62 typeset passphrase="password" 64 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 65 "-o keyformat=passphrase $TESTPOOL/$TESTFS1" 76 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2" 79 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3" 100 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2" 106 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3"
|
H A D | send_encrypted_incremental.ksh | 57 typeset passphrase="password" 67 log_must eval "echo $passphrase > /pool_lb/pwd" 70 log_must zfs create -o encryption=on -o keyformat=passphrase \ 79 -o encryption=on -o keyformat=passphrase -o keylocation=file:///pool_lb/pwd2 \
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/ |
H A D | zpool_create_encrypted.ksh | 69 log_mustnot zpool create -O keyformat=passphrase $TESTPOOL $DISKS 70 log_mustnot zpool create -O keyformat=passphrase -O keylocation=prompt \ 78 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \ 80 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \ 88 "-O keyformat=passphrase -O keylocation=prompt" \ 92 "-O keyformat=passphrase $TESTPOOL $DISKS" 96 "-O keyformat=passphrase -O keylocation=prompt $TESTPOOL $DISKS"
|
/freebsd-current/crypto/openssh/ |
H A D | authfile.h | 45 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_load-key/ |
H A D | zfs_load-key_https.ksh | 50 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \ 53 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \ 56 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \ 59 log_must zfs create -o encryption=on -o keyformat=passphrase \
|
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_create/ |
H A D | zfs_create_encrypted.ksh | 84 log_mustnot zfs create -o keyformat=passphrase $TESTPOOL/$TESTFS1/c1 86 log_mustnot zfs create -o keyformat=passphrase -o keylocation=prompt \ 92 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \ 94 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \ 101 "-o keyformat=passphrase $TESTPOOL/$TESTFS1/c3" 103 "-o keyformat=passphrase -o keylocation=prompt $TESTPOOL/$TESTFS1/c4" 107 "-o keyformat=passphrase $TESTPOOL/$TESTFS2" 111 log_must eval "echo $PASSPHRASE | zfs create -o keyformat=passphrase" \ 113 log_must eval "echo $PASSPHRASE | zfs create -o keyformat=passphrase" \ 121 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \ [all...] |