/macosx-10.10/curl-83.1.2/curl/tests/unit/ |
H A D | unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 100 if(passphrase) { 101 if(strcmp(p[2], passphrase)) { 102 printf("expected passphrase '%s' but got '%s'" 103 "for -E param '%s'\n", p[2], passphrase, p[0]); 107 printf("expected passphrase '%s' but got NULL " 112 if(passphrase) { 113 printf("expected passphrase NUL 119 if(passphrase) free(passphrase); variable [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | keychain.h | 41 void store_in_keychain(const char *filename, const char *passphrase);
|
H A D | authfile.c | 7 * for reading the passphrase from the user. 86 * passphrase. The identification of the blob (lowest 64 bits of n) will 88 * passphrase. 91 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, argument 102 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 105 cipher_num = (strcmp(passphrase, "") == 0) ? 113 /* Put checkbytes for checking passphrase validity. */ 156 cipher_set_key_string(&ciphercontext, cipher, passphrase, 180 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 190 error("passphrase to 247 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument 264 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument 424 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument 525 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument 602 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument 647 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument 666 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument 704 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument 727 key_load_private(const char *filename, const char *passphrase, char **commentp) argument 851 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument [all...] |
/macosx-10.10/emacs-93/emacs/lisp/ |
H A D | pgg-gpg.el | 63 (defun pgg-gpg-process-region (start end passphrase program args) 64 (let* ((use-agent (and (null passphrase) (pgg-gpg-use-agent-p))) 69 (if passphrase '("--passphrase-fd" "0"))) 79 passphrase-with-newline 80 encoded-passphrase-with-new-line) 92 (when passphrase 93 (setq passphrase-with-newline (concat passphrase "\n")) 94 (if pgg-passphrase [all...] |
H A D | pgg-pgp.el | 63 (defun pgg-pgp-process-region (start end passphrase program args) 79 (when passphrase 89 (when passphrase 90 (process-send-string process (concat passphrase "\n"))) 134 (defun pgg-pgp-encrypt-region (start end recipients &optional sign passphrase) 137 (passphrase (or passphrase 139 (pgg-read-passphrase 140 (format "PGP passphrase for %s: " 155 (defun pgg-pgp-decrypt-region (start end &optional passphrase) [all...] |
H A D | pgg-pgp5.el | 78 (defun pgg-pgp5-process-region (start end passphrase program args) 94 (when passphrase 105 (when passphrase 106 (process-send-string process (concat passphrase "\n"))) 146 (defun pgg-pgp5-encrypt-region (start end recipients &optional sign passphrase) 149 (passphrase (or passphrase 151 (pgg-read-passphrase 152 (format "PGP passphrase for %s: " 170 (defun pgg-pgp5-decrypt-region (start end &optional passphrase) [all...] |
H A D | pgg.el | 96 (defvar pgg-passphrase-cache (make-vector 7 0)) 104 (defun pgg-read-passphrase (prompt &optional key notruncate) 105 "Using PROMPT, obtain passphrase for KEY from cache or user. 110 Custom variables `pgg-cache-passphrase' and `pgg-passphrase-cache-expiry' 112 (or (pgg-read-passphrase-from-cache key notruncate) 115 (defun pgg-read-passphrase-from-cache (key &optional notruncate) 116 "Obtain passphrase for KEY from time-limited passphrase cache. 121 Custom variables `pgg-cache-passphrase' an [all...] |
/macosx-10.10/OpenSSH-189/openssh/contrib/ |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | p12import.h | 40 CFStringRef passphrase; member in struct:__anon5180
|
H A D | p12pbegen.h | 34 int p12_pbe_gen(CFStringRef passphrase, uint8_t *salt_ptr, size_t salt_length,
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | dbcrypto.h | 55 void setup(const DbBlob *blob, const CssmData &passphrase); 75 bool validatePassphrase(const CssmData &passphrase); 82 uint8 mSalt[20]; // salt for master key derivation from passphrase (only) 87 CssmClient::Key deriveDbMasterKey(const CssmData &passphrase) const;
|
H A D | tempdatabase.cpp | 105 // Invoke the Security Agent to get a passphrase (other than for a Keychain) 108 string &passphrase) 116 agentQuery(promptData, verify, passphrase); 126 secdebug("SSdb", "requesting secure passphrase"); 128 string passphrase; local 129 getSecurePassphrase(context, passphrase); 131 secdebug("SSdb", "wrapping securely-obtained passphrase as key"); 133 // CssmKey rawKey(StringData(passphrase)) confuses gcc 134 StringData passphraseData(passphrase); 107 getSecurePassphrase(const Context &context, string &passphrase) argument
|
H A D | tempdatabase.h | 60 void getSecurePassphrase(const Context &context, string &passphrase);
|
H A D | agentquery.h | 181 const KeychainDatabase *mPassphraseCheck; // NULL to not check passphrase 195 // A query for an existing passphrase 215 Reason retrievePassword(CssmOwnedData &passphrase); 218 Reason accept(CssmManagedData &passphrase); 227 Reason accept(CssmManagedData &passphrase); 238 Reason query(CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase); 260 // A query for a new passphrase 273 Reason operator () (CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase); 277 virtual Reason accept(CssmManagedData &passphrase, CssmData *oldPassphrase); 288 // Generic passphrase quer [all...] |
H A D | agentquery.cpp | 758 // if passphrase checking requested, save KeychainDatabase reference 786 mPassphraseCheck ? ":passphrase" : ""); 787 // turn passphrase (no ':') into y:passphrase 909 // or we can't get another passphrase. Accept() should consume the passphrase 910 // if it is accepted. If no passphrase is acceptable, throw out of here. 918 CssmAutoData passphrase(Allocator::standard(Allocator::sensitive)); 922 // return the passphrase 925 getNoSA(passphrase, maxPassphraseLengt 990 accept(CssmManagedData &passphrase) argument 998 retrievePassword(CssmOwnedData &passphrase) argument 1078 query(CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase) argument 1256 operator ()(CssmOwnedData &oldPassphrase, CssmOwnedData &passphrase) argument 1265 accept(CssmManagedData &passphrase, CssmData *oldPassphrase) argument 1292 operator ()(const CssmData *prompt, bool verify, string &passphrase) argument 1298 query(const CssmData *prompt, bool verify, string &passphrase) argument 1398 accept(CssmManagedData &passphrase, DbHandle *dbHandlesToAuthenticate, uint8 dbHandleCount, DbHandle *dbHandleAuthenticated) argument 1564 accept(string &username, string &passphrase) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12GetPassKey.cpp | 12 /* when true, simulate secure passphrase in CSPDL */ 57 char passphrase[512]; local 60 printf("Enter passphrase for PKCS12 Decode: "); 63 printf("Enter passphrase for PKCS12 Encode: "); 65 getString(passphrase, 512); 67 /* cook up a raw key with passphrase as data */ 68 unsigned phraseLen = strlen(passphrase); 82 /* data = Unicode version of C string passphrase, bigendian */ 85 const char *cpIn = passphrase; 95 CFStringRef cfStr = CFStringCreateWithCString(NULL, passphrase, [all...] |
/macosx-10.10/curl-83.1.2/curl/src/ |
H A D | tool_getparam.h | 55 char **passphrase);
|
/macosx-10.10/Heimdal-398.1.2/lib/otp/ |
H A D | otptest.c | 70 char *passphrase; member in struct:test 125 if(alg->init (key, t->passphrase, t->seed))
|
/macosx-10.10/OpenSSH-189/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/macosx-10.10/emacs-93/emacs/lisp/gnus/ |
H A D | smime.el | 237 (defun smime-ask-passphrase () 238 "Asks the passphrase to unlock the secret key." 239 (let ((passphrase 241 "Passphrase for secret key (RET for no passphrase): "))) 242 (if (string= passphrase "") 244 passphrase))) 276 (passphrase (smime-ask-passphrase)) 278 (if passphrase 279 (setenv "GNUS_SMIME_PASSPHRASE" passphrase)) [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/kcExport/ |
H A D | kcExport.cpp | 26 printf(" -z passphrase (for PKCS12 and wrapped keys only)\n"); 27 printf(" -Z Use secure passphrase\n"); 141 CFStringRef passphrase = NULL; local 212 passphrase = CFStringCreateWithCString(NULL, optarg, 335 if((passphrase != NULL) || securePassphrase) { 343 keyParams.passphrase = passphrase; // may be NULL 382 if(passphrase) { 383 CFRelease(passphrase);
|
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | keychain_export.c | 140 const char *passphrase, 253 * Always specify some kind of passphrase - default is secure passkey. 257 if(passphrase != NULL) { 258 passStr = CFStringCreateWithCString(NULL, passphrase, kCFStringEncodingASCII); 259 keyParams.passphrase = passStr; 318 const char *passphrase = NULL; local 398 passphrase = optarg; 435 passphrase, doPem, outFile); 136 do_keychain_export( SecKeychainRef kcRef, SecExternalFormat externFormat, ItemSpec itemSpec, const char *passphrase, int doPem, const char *fileName) argument
|
/macosx-10.10/Security-57031.1.35/Security/include/security_pkcs12/ |
H A D | pkcs12Coder.cpp | 198 /* no separate passphrase found, use MAC passphrase */ 253 CFStringRef passphrase) 255 CFRetain(passphrase); 256 mMacPassphrase = passphrase; 260 CFStringRef passphrase) 262 CFRetain(passphrase); 263 mEncrPassPhrase = passphrase; 252 setMacPassPhrase( CFStringRef passphrase) argument 259 setEncrPassPhrase( CFStringRef passphrase) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/ |
H A D | pkcs12Coder.cpp | 198 /* no separate passphrase found, use MAC passphrase */ 253 CFStringRef passphrase) 255 CFRetain(passphrase); 256 mMacPassphrase = passphrase; 260 CFStringRef passphrase) 262 CFRetain(passphrase); 263 mEncrPassPhrase = passphrase; 252 setMacPassPhrase( CFStringRef passphrase) argument 259 setEncrPassPhrase( CFStringRef passphrase) argument
|