Searched refs:passphrase (Results 1 - 25 of 119) sorted by relevance

12345

/freebsd-current/contrib/wpa/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
23 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
24 "\nIf passphrase is left out, it will be read from "
32 passphrase = argv[2];
34 fprintf(stderr, "# reading passphrase from stdin\n");
36 fprintf(stderr, "Failed to read passphrase\n");
48 passphrase = buf;
51 len = os_strlen(passphrase);
56 if (has_ctrl_char((u8 *) passphrase, le
[all...]
/freebsd-current/crypto/openssl/demos/encode/
H A Dec_encode.c27 * supplied passphrase.
29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) argument
55 * Set passphrase if provided; needed to decrypt encrypted PEM files.
56 * If the input is not encrypted, any passphrase provided is ignored.
60 * interactive applications which do not know if a passphrase should be
63 if (passphrase != NULL) {
65 (const unsigned char *)passphrase,
66 strlen(passphrase)) == 0) {
98 * If a passphrase is supplied, the file is encrypted, otherwise
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) argument
[all...]
H A Drsa_encode.c27 * supplied passphrase.
29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) argument
55 * Set passphrase if provided; needed to decrypt encrypted PEM files.
56 * If the input is not encrypted, any passphrase provided is ignored.
60 * interactive applications which do not know if a passphrase should be
63 if (passphrase != NULL) {
65 (const unsigned char *)passphrase,
66 strlen(passphrase)) == 0) {
98 * If a passphrase is supplied, the file is encrypted, otherwise
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) argument
[all...]
/freebsd-current/sys/geom/eli/
H A Dpkcs5v2.h32 size_t saltsize, const char *passphrase, u_int iterations);
H A Dpkcs5v2.c52 size_t saltsize, const char *passphrase, u_int iterations)
60 passlen = strlen(passphrase);
71 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen);
97 const char passphrase[] = "passphrase"; local
102 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase,
51 pkcs5v2_genkey(uint8_t *key, unsigned keylen, const uint8_t *salt, size_t saltsize, const char *passphrase, u_int iterations) argument
/freebsd-current/contrib/libarchive/libarchive/
H A Darchive_read_add_passphrase.c66 new_read_passphrase(struct archive_read *a, const char *passphrase) argument
76 p->passphrase = strdup(passphrase);
77 if (p->passphrase == NULL) {
87 archive_read_add_passphrase(struct archive *_a, const char *passphrase) argument
95 if (passphrase == NULL || passphrase[0] == '\0') {
97 "Empty passphrase is unacceptable");
101 p = new_read_passphrase(a, passphrase);
124 * Call this in advance when you start to get a passphrase fo
141 const char *passphrase; local
[all...]
H A Darchive_write_set_passphrase.c38 "Empty passphrase is unacceptable");
41 free(a->passphrase);
42 a->passphrase = strdup(p);
43 if (a->passphrase == NULL) {
45 "Can't allocate data for passphrase");
83 if (a->passphrase != NULL)
84 return (a->passphrase);
94 return (a->passphrase);
/freebsd-current/contrib/wpa/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/
H A Dzpool_split_encryption.ksh43 passphrase="password"
49 log_must eval "echo "$passphrase" | zpool create -O encryption=aes-256-ccm " \
50 "-O keyformat=passphrase $TESTPOOL mirror $DEVICE1 $DEVICE2"
53 log_must eval "echo "$passphrase" | zpool split -l -R $altroot " \
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_raw_-d.ksh49 typeset passphrase="password1"
53 log_must eval "echo $passphrase | zfs create -o encryption=on" \
54 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
60 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/child"
H A Dzfs_receive_raw.ksh57 typeset passphrase="password"
60 log_must eval "echo $passphrase | zfs create -o encryption=on" \
61 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
75 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS2"
87 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/c1"
H A Dzfs_receive_-wR-encrypted-mix.ksh62 create_dataset "$src" -o encryption=on -o keyformat=passphrase
65 create_dataset "$src/u/e" -o encryption=on -o keyformat=passphrase
H A Dzfs_receive_raw_incremental.ksh33 # 6. Change the passphrase required to unlock the original filesystem
35 # 8. Verify that the required passphrase hasn't changed on the receive side
61 typeset passphrase="password"
66 log_must eval "echo $passphrase | zfs create -o encryption=on" \
67 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
86 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2"
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_send/
H A Dzfs_send_encrypted_unloaded.ksh48 typeset passphrase="password"
51 log_must eval "echo $passphrase | zfs create -o encryption=on" \
52 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
H A Dzfs_send_encrypted.ksh53 typeset passphrase="password"
57 log_must eval "echo $passphrase | zfs create -o encryption=on" \
58 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
61 "-o keyformat=passphrase $TESTPOOL/$TESTFS1/child"
H A Dzfs_send_raw.ksh50 typeset passphrase="password"
54 log_must eval "echo $passphrase | zfs create -o encryption=on" \
55 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
/freebsd-current/crypto/openssh/contrib/
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
166 message = "Enter your OpenSSH passphrase
[all...]
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
153 char *passphrase, *local; local
272 /* Report passphrase if user selected OK */
274 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
276 local = g_locale_from_utf8(passphrase,
277 strlen(passphrase), NULL, NULL, NULL);
283 puts(passphrase);
286 /* Zero passphrase in memory */
287 memset(passphrase, '\b', strlen(passphrase));
288 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
H A Dgnome-ssh-askpass3.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
137 char *passphrase, *local; local
241 /* Report passphrase if user selected OK */
243 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
245 local = g_locale_from_utf8(passphrase,
246 strlen(passphrase), NULL, NULL, NULL);
252 puts(passphrase);
255 /* Zero passphrase in memory */
256 memset(passphrase, '\b', strlen(passphrase));
257 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_mixed_raw.ksh62 typeset passphrase="password"
64 log_must eval "echo $passphrase | zfs create -o encryption=on" \
65 "-o keyformat=passphrase $TESTPOOL/$TESTFS1"
76 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2"
79 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3"
100 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2"
106 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3"
H A Dsend_encrypted_incremental.ksh57 typeset passphrase="password"
67 log_must eval "echo $passphrase > /pool_lb/pwd"
70 log_must zfs create -o encryption=on -o keyformat=passphrase \
79 -o encryption=on -o keyformat=passphrase -o keylocation=file:///pool_lb/pwd2 \
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/
H A Dzpool_create_encrypted.ksh69 log_mustnot zpool create -O keyformat=passphrase $TESTPOOL $DISKS
70 log_mustnot zpool create -O keyformat=passphrase -O keylocation=prompt \
78 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
80 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
88 "-O keyformat=passphrase -O keylocation=prompt" \
92 "-O keyformat=passphrase $TESTPOOL $DISKS"
96 "-O keyformat=passphrase -O keylocation=prompt $TESTPOOL $DISKS"
/freebsd-current/crypto/openssh/
H A Dauthfile.h45 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_load-key/
H A Dzfs_load-key_https.ksh50 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
53 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
56 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
59 log_must zfs create -o encryption=on -o keyformat=passphrase \
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_create/
H A Dzfs_create_encrypted.ksh84 log_mustnot zfs create -o keyformat=passphrase $TESTPOOL/$TESTFS1/c1
86 log_mustnot zfs create -o keyformat=passphrase -o keylocation=prompt \
92 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
94 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
101 "-o keyformat=passphrase $TESTPOOL/$TESTFS1/c3"
103 "-o keyformat=passphrase -o keylocation=prompt $TESTPOOL/$TESTFS1/c4"
107 "-o keyformat=passphrase $TESTPOOL/$TESTFS2"
111 log_must eval "echo $PASSPHRASE | zfs create -o keyformat=passphrase" \
113 log_must eval "echo $PASSPHRASE | zfs create -o keyformat=passphrase" \
121 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
[all...]

Completed in 140 milliseconds

12345