Searched refs:passphrase (Results 1 - 9 of 9) sorted by relevance
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/wget-1.12/build-aux/ |
H A D | gnupload | 214 # for the passphrase if the script will fail. 233 # Make sure passphrase is not exported in the environment. 234 unset passphrase 237 # `echo $passphrase' to output the passphrase, so it is important that 242 PATH=/empty echo -n "Enter GPG passphrase: " 244 read -r passphrase 253 echo "$passphrase" | $dbg $GPG --passphrase-fd 0 -ba -o $file.sig $file 311 echo "$passphrase" | [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | kdf.c | 31 /* Transform a passphrase into a suitable key of length KEYSIZE and 37 openpgp_s2k (const void *passphrase, size_t passphraselen, argument 54 secmode = gcry_is_secure (passphrase) || gcry_is_secure (keybuffer); 85 gcry_md_write (md, passphrase, passphraselen); 94 gcry_md_write (md, passphrase, count); 98 gcry_md_write (md, passphrase, passphraselen); 112 /* Transform a passphrase into a suitable key of length KEYSIZE and 119 pkdf2 (const void *passphrase, size_t passphraselen, argument 148 secmode = gcry_is_secure (passphrase) || gcry_is_secure (keybuffer); 181 ec = gpg_err_code (gcry_md_setkey (md, passphrase, passphrasele 233 gcry_kdf_derive(const void *passphrase, size_t passphraselen, int algo, int subalgo, const void *salt, size_t saltlen, unsigned long iterations, size_t keysize, void *keybuffer) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | ssh.h | 107 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
H A D | ssh.c | 816 sshc->passphrase = data->set.str[STRING_KEY_PASSWD]; 817 if(!sshc->passphrase) 818 sshc->passphrase = ""; 841 sshc->rsa, sshc->passphrase);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/ |
H A D | uam.c | 527 int colinput, char *gssapi, char *passphrase) 548 if ((rc=sia_ses_authent(collect, passphrase, entity)) != SIASUCCESS) { 525 uam_sia_validate_user(sia_collect_func_t * collect, int argc, char **argv, char *hostname, char *username, char *tty, int colinput, char *gssapi, char *passphrase) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/prebuilt/WW/www/ |
H A D | funcs.js | 867 function checkpsk(passphrase, passphrase_len) 869 var len = passphrase.value.length; 872 //Don't enable Hex passphrase support 878 if(isValidHex(passphrase.value.charAt(i))==false) 897 for(i=0;i<passphrase.value.length;i++) 899 if(isValidChar_space(passphrase.value.charCodeAt(i))==false)
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/src/ |
H A D | visibility.c | 1214 gcry_kdf_derive (const void *passphrase, size_t passphraselen, argument 1220 return _gcry_kdf_derive (passphrase, passphraselen, algo, hashalgo,
|
H A D | gcrypt.h | 1688 /* Derive a key from a passphrase. */ 1689 gpg_error_t gcry_kdf_derive (const void *passphrase, size_t passphraselen,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/shared/ |
H A D | broadcom.c | 11888 unsigned char passphrase[]=NVRAM_PASSPHRASE; local 12028 fPRF(passphrase,strlen((char *)passphrase),NULL,0, 12305 unsigned char passphrase[]=NVRAM_PASSPHRASE; local 12386 fPRF(passphrase,strlen((char *)passphrase),NULL,0,
|
Completed in 122 milliseconds