Searched refs:passphrase (Results 1 - 9 of 9) sorted by relevance

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/wget-1.12/build-aux/
H A Dgnupload214 # for the passphrase if the script will fail.
233 # Make sure passphrase is not exported in the environment.
234 unset passphrase
237 # `echo $passphrase' to output the passphrase, so it is important that
242 PATH=/empty echo -n "Enter GPG passphrase: "
244 read -r passphrase
253 echo "$passphrase" | $dbg $GPG --passphrase-fd 0 -ba -o $file.sig $file
311 echo "$passphrase" |
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dkdf.c31 /* Transform a passphrase into a suitable key of length KEYSIZE and
37 openpgp_s2k (const void *passphrase, size_t passphraselen, argument
54 secmode = gcry_is_secure (passphrase) || gcry_is_secure (keybuffer);
85 gcry_md_write (md, passphrase, passphraselen);
94 gcry_md_write (md, passphrase, count);
98 gcry_md_write (md, passphrase, passphraselen);
112 /* Transform a passphrase into a suitable key of length KEYSIZE and
119 pkdf2 (const void *passphrase, size_t passphraselen, argument
148 secmode = gcry_is_secure (passphrase) || gcry_is_secure (keybuffer);
181 ec = gpg_err_code (gcry_md_setkey (md, passphrase, passphrasele
233 gcry_kdf_derive(const void *passphrase, size_t passphraselen, int algo, int subalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/
H A Dssh.h107 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
H A Dssh.c816 sshc->passphrase = data->set.str[STRING_KEY_PASSWD];
817 if(!sshc->passphrase)
818 sshc->passphrase = "";
841 sshc->rsa, sshc->passphrase);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/
H A Duam.c527 int colinput, char *gssapi, char *passphrase)
548 if ((rc=sia_ses_authent(collect, passphrase, entity)) != SIASUCCESS) {
525 uam_sia_validate_user(sia_collect_func_t * collect, int argc, char **argv, char *hostname, char *username, char *tty, int colinput, char *gssapi, char *passphrase) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/prebuilt/WW/www/
H A Dfuncs.js867 function checkpsk(passphrase, passphrase_len)
869 var len = passphrase.value.length;
872 //Don't enable Hex passphrase support
878 if(isValidHex(passphrase.value.charAt(i))==false)
897 for(i=0;i<passphrase.value.length;i++)
899 if(isValidChar_space(passphrase.value.charCodeAt(i))==false)
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/src/
H A Dvisibility.c1214 gcry_kdf_derive (const void *passphrase, size_t passphraselen, argument
1220 return _gcry_kdf_derive (passphrase, passphraselen, algo, hashalgo,
H A Dgcrypt.h1688 /* Derive a key from a passphrase. */
1689 gpg_error_t gcry_kdf_derive (const void *passphrase, size_t passphraselen,
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/shared/
H A Dbroadcom.c11888 unsigned char passphrase[]=NVRAM_PASSPHRASE; local
12028 fPRF(passphrase,strlen((char *)passphrase),NULL,0,
12305 unsigned char passphrase[]=NVRAM_PASSPHRASE; local
12386 fPRF(passphrase,strlen((char *)passphrase),NULL,0,

Completed in 122 milliseconds