Searched refs:passphrase (Results 1 - 25 of 104) sorted by relevance

12345

/macosx-10.10/curl-83.1.2/curl/tests/unit/
H A Dunit1394.c45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
100 if(passphrase) {
101 if(strcmp(p[2], passphrase)) {
102 printf("expected passphrase '%s' but got '%s'"
103 "for -E param '%s'\n", p[2], passphrase, p[0]);
107 printf("expected passphrase '%s' but got NULL "
112 if(passphrase) {
113 printf("expected passphrase NUL
119 if(passphrase) free(passphrase); variable
[all...]
/macosx-10.10/OpenSSH-189/openssh/
H A Dkeychain.h41 void store_in_keychain(const char *filename, const char *passphrase);
H A Dauthfile.c7 * for reading the passphrase from the user.
86 * passphrase. The identification of the blob (lowest 64 bits of n) will
88 * passphrase.
91 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, argument
102 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
105 cipher_num = (strcmp(passphrase, "") == 0) ?
113 /* Put checkbytes for checking passphrase validity. */
156 cipher_set_key_string(&ciphercontext, cipher, passphrase,
180 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
190 error("passphrase to
247 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument
264 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument
424 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument
525 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument
602 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument
647 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument
666 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument
704 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument
727 key_load_private(const char *filename, const char *passphrase, char **commentp) argument
851 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument
[all...]
/macosx-10.10/emacs-93/emacs/lisp/
H A Dpgg-gpg.el63 (defun pgg-gpg-process-region (start end passphrase program args)
64 (let* ((use-agent (and (null passphrase) (pgg-gpg-use-agent-p)))
69 (if passphrase '("--passphrase-fd" "0")))
79 passphrase-with-newline
80 encoded-passphrase-with-new-line)
92 (when passphrase
93 (setq passphrase-with-newline (concat passphrase "\n"))
94 (if pgg-passphrase
[all...]
H A Dpgg-pgp.el63 (defun pgg-pgp-process-region (start end passphrase program args)
79 (when passphrase
89 (when passphrase
90 (process-send-string process (concat passphrase "\n")))
134 (defun pgg-pgp-encrypt-region (start end recipients &optional sign passphrase)
137 (passphrase (or passphrase
139 (pgg-read-passphrase
140 (format "PGP passphrase for %s: "
155 (defun pgg-pgp-decrypt-region (start end &optional passphrase)
[all...]
H A Dpgg-pgp5.el78 (defun pgg-pgp5-process-region (start end passphrase program args)
94 (when passphrase
105 (when passphrase
106 (process-send-string process (concat passphrase "\n")))
146 (defun pgg-pgp5-encrypt-region (start end recipients &optional sign passphrase)
149 (passphrase (or passphrase
151 (pgg-read-passphrase
152 (format "PGP passphrase for %s: "
170 (defun pgg-pgp5-decrypt-region (start end &optional passphrase)
[all...]
H A Dpgg.el96 (defvar pgg-passphrase-cache (make-vector 7 0))
104 (defun pgg-read-passphrase (prompt &optional key notruncate)
105 "Using PROMPT, obtain passphrase for KEY from cache or user.
110 Custom variables `pgg-cache-passphrase' and `pgg-passphrase-cache-expiry'
112 (or (pgg-read-passphrase-from-cache key notruncate)
115 (defun pgg-read-passphrase-from-cache (key &optional notruncate)
116 "Obtain passphrase for KEY from time-limited passphrase cache.
121 Custom variables `pgg-cache-passphrase' an
[all...]
/macosx-10.10/OpenSSH-189/openssh/contrib/
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A Dp12import.h40 CFStringRef passphrase; member in struct:__anon5180
H A Dp12pbegen.h34 int p12_pbe_gen(CFStringRef passphrase, uint8_t *salt_ptr, size_t salt_length,
/macosx-10.10/Security-57031.1.35/securityd/src/
H A Ddbcrypto.h55 void setup(const DbBlob *blob, const CssmData &passphrase);
75 bool validatePassphrase(const CssmData &passphrase);
82 uint8 mSalt[20]; // salt for master key derivation from passphrase (only)
87 CssmClient::Key deriveDbMasterKey(const CssmData &passphrase) const;
H A Dtempdatabase.cpp105 // Invoke the Security Agent to get a passphrase (other than for a Keychain)
108 string &passphrase)
116 agentQuery(promptData, verify, passphrase);
126 secdebug("SSdb", "requesting secure passphrase");
128 string passphrase; local
129 getSecurePassphrase(context, passphrase);
131 secdebug("SSdb", "wrapping securely-obtained passphrase as key");
133 // CssmKey rawKey(StringData(passphrase)) confuses gcc
134 StringData passphraseData(passphrase);
107 getSecurePassphrase(const Context &context, string &passphrase) argument
H A Dtempdatabase.h60 void getSecurePassphrase(const Context &context, string &passphrase);
H A Dagentquery.h181 const KeychainDatabase *mPassphraseCheck; // NULL to not check passphrase
195 // A query for an existing passphrase
215 Reason retrievePassword(CssmOwnedData &passphrase);
218 Reason accept(CssmManagedData &passphrase);
227 Reason accept(CssmManagedData &passphrase);
238 Reason query(CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase);
260 // A query for a new passphrase
273 Reason operator () (CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase);
277 virtual Reason accept(CssmManagedData &passphrase, CssmData *oldPassphrase);
288 // Generic passphrase quer
[all...]
H A Dagentquery.cpp758 // if passphrase checking requested, save KeychainDatabase reference
786 mPassphraseCheck ? ":passphrase" : "");
787 // turn passphrase (no ':') into y:passphrase
909 // or we can't get another passphrase. Accept() should consume the passphrase
910 // if it is accepted. If no passphrase is acceptable, throw out of here.
918 CssmAutoData passphrase(Allocator::standard(Allocator::sensitive));
922 // return the passphrase
925 getNoSA(passphrase, maxPassphraseLengt
990 accept(CssmManagedData &passphrase) argument
998 retrievePassword(CssmOwnedData &passphrase) argument
1078 query(CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase) argument
1256 operator ()(CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase) argument
1265 accept(CssmManagedData &passphrase, CssmData *oldPassphrase) argument
1292 operator ()(const CssmData *prompt, bool verify, string &passphrase) argument
1298 query(const CssmData *prompt, bool verify, string &passphrase) argument
1398 accept(CssmManagedData &passphrase, DbHandle *dbHandlesToAuthenticate, uint8 dbHandleCount, DbHandle *dbHandleAuthenticated) argument
1564 accept(string &username, string &passphrase) argument
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/
H A Dp12GetPassKey.cpp12 /* when true, simulate secure passphrase in CSPDL */
57 char passphrase[512]; local
60 printf("Enter passphrase for PKCS12 Decode: ");
63 printf("Enter passphrase for PKCS12 Encode: ");
65 getString(passphrase, 512);
67 /* cook up a raw key with passphrase as data */
68 unsigned phraseLen = strlen(passphrase);
82 /* data = Unicode version of C string passphrase, bigendian */
85 const char *cpIn = passphrase;
95 CFStringRef cfStr = CFStringCreateWithCString(NULL, passphrase,
[all...]
/macosx-10.10/curl-83.1.2/curl/src/
H A Dtool_getparam.h55 char **passphrase);
/macosx-10.10/Heimdal-398.1.2/lib/otp/
H A Dotptest.c70 char *passphrase; member in struct:test
125 if(alg->init (key, t->passphrase, t->seed))
/macosx-10.10/OpenSSH-189/openssh/contrib/cygwin/
H A Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
/macosx-10.10/emacs-93/emacs/lisp/gnus/
H A Dsmime.el237 (defun smime-ask-passphrase ()
238 "Asks the passphrase to unlock the secret key."
239 (let ((passphrase
241 "Passphrase for secret key (RET for no passphrase): ")))
242 (if (string= passphrase "")
244 passphrase)))
276 (passphrase (smime-ask-passphrase))
278 (if passphrase
279 (setenv "GNUS_SMIME_PASSPHRASE" passphrase))
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/kcExport/
H A DkcExport.cpp26 printf(" -z passphrase (for PKCS12 and wrapped keys only)\n");
27 printf(" -Z Use secure passphrase\n");
141 CFStringRef passphrase = NULL; local
212 passphrase = CFStringCreateWithCString(NULL, optarg,
335 if((passphrase != NULL) || securePassphrase) {
343 keyParams.passphrase = passphrase; // may be NULL
382 if(passphrase) {
383 CFRelease(passphrase);
/macosx-10.10/Security-57031.1.35/SecurityTool/
H A Dkeychain_export.c140 const char *passphrase,
253 * Always specify some kind of passphrase - default is secure passkey.
257 if(passphrase != NULL) {
258 passStr = CFStringCreateWithCString(NULL, passphrase, kCFStringEncodingASCII);
259 keyParams.passphrase = passStr;
318 const char *passphrase = NULL; local
398 passphrase = optarg;
435 passphrase, doPem, outFile);
136 do_keychain_export( SecKeychainRef kcRef, SecExternalFormat externFormat, ItemSpec itemSpec, const char *passphrase, int doPem, const char *fileName) argument
/macosx-10.10/Security-57031.1.35/Security/include/security_pkcs12/
H A Dpkcs12Coder.cpp198 /* no separate passphrase found, use MAC passphrase */
253 CFStringRef passphrase)
255 CFRetain(passphrase);
256 mMacPassphrase = passphrase;
260 CFStringRef passphrase)
262 CFRetain(passphrase);
263 mEncrPassPhrase = passphrase;
252 setMacPassPhrase( CFStringRef passphrase) argument
259 setEncrPassPhrase( CFStringRef passphrase) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/
H A Dpkcs12Coder.cpp198 /* no separate passphrase found, use MAC passphrase */
253 CFStringRef passphrase)
255 CFRetain(passphrase);
256 mMacPassphrase = passphrase;
260 CFStringRef passphrase)
262 CFRetain(passphrase);
263 mEncrPassPhrase = passphrase;
252 setMacPassPhrase( CFStringRef passphrase) argument
259 setEncrPassPhrase( CFStringRef passphrase) argument

Completed in 189 milliseconds

12345