/opensolaris-onvv-gate/usr/src/cmd/ssh/libssh/common/ |
H A D | authfile.c | 6 * for reading the passphrase from the user. 63 * passphrase. The identification of the file (lowest 64 bits of n) will 65 * passphrase. 69 key_save_private_rsa1(Key *key, const char *filename, const char *passphrase, argument 80 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 83 cipher_num = (strcmp(passphrase, "") == 0) ? 91 /* Put checkbytes for checking passphrase validity. */ 134 cipher_set_key_string(&ciphercontext, cipher, passphrase, 173 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 177 error("passphrase to 206 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument 313 key_load_private_rsa1(int fd, const char *filename, const char *passphrase, char **commentp) argument 427 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument 506 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp) argument 539 key_load_private(const char *filename, const char *passphrase, char **commentp) argument [all...] |
H A D | cipher.c | 277 * passphrase and using the resulting 16 bytes as the key. 282 const char *passphrase, int encrypt) 288 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); 281 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int encrypt) argument
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm.c | 83 * Read a passphrase from the file into the supplied buffer. 86 * Return 0 when no valid passphrase was found in the file. 123 char *passphrase = getpassphrase("Enter passphrase: "); local 124 if (passphrase) { 125 return (strlcpy(buf, passphrase, buf_size));
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 115 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2 119 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, 134 * given passphrase. The caller is responsible to free the allocated 138 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase,
|
/opensolaris-onvv-gate/usr/src/cmd/ssh/ssh-keygen/ |
H A D | ssh-keygen.c | 42 * Flag indicating that we just want to change the passphrase. This can be 70 /* This is set to the passphrase if given on the command line. */ 73 /* This is set to the new passphrase if given on the command line. */ 142 pass = read_passphrase(gettext("Enter passphrase: "), 727 * Perform changing a passphrase. The argument is the passwd structure 744 /* Try to load the file with empty passphrase. */ 751 read_passphrase(gettext("Enter old passphrase: "), 758 printf(gettext("Bad passphrase.\n")); 764 /* Ask the new passphrase (twice). */ 770 read_passphrase(gettext("Enter new passphrase (empt 816 char new_comment[1024], *comment, *passphrase; local [all...] |
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11SUNWExtensions.c | 371 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2 377 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, argument 390 passphrase == NULL || passphrase_len == 0 || 440 params.pPassword = (CK_UTF8CHAR_PTR)passphrase; 502 * secret key object from a passphrase, an app may call pkcs11_ObjectToKey 558 * given passphrase. The caller is responsible to free the allocated 562 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase, argument 569 rv = pkcs11_PasswdToPBKD2Object(hSession, passphrase, passphrase_len,
|
/opensolaris-onvv-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | ipp-support.c | 422 char *user, *passphrase; local 442 /* if the passphrase is not set, use the Authentication Callback */ 446 passphrase = svc->password; 448 /* if there is still no passphrase, we have to fail */ 449 if ((passphrase == NULL) || (passphrase[0] == '\0')) 456 snprintf(plain, sizeof (plain), "%s:%s", user, passphrase); 475 passphrase);
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_enc.c | 205 pbkdf2_sha1(char *passphrase, char *ssid, size_t ssid_len, int iterations, argument 208 (void) PKCS5_PBKDF2_HMAC_SHA1(passphrase, -1, (unsigned char *)ssid,
|
H A D | wpa_impl.h | 246 char *passphrase; member in struct:wpa_ssid
|
H A D | wpa_supplicant.c | 706 ssid->passphrase = strdup((const char *)psk); 708 if (ssid->passphrase) { 709 pbkdf2_sha1(ssid->passphrase, (char *)ssid->ssid, 711 wpa_hexdump(MSG_MSGDUMP, "PSK (from passphrase)", 759 free(ssid->passphrase);
|
/opensolaris-onvv-gate/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect1.c | 217 char buf[300], *passphrase, *comment, *authfile; local 258 * load the private key. Try first with empty passphrase; if it 259 * fails, ask for a passphrase. 267 gettext("Enter passphrase for RSA key '%.100s': "), 270 passphrase = read_passphrase(buf, 0); 271 if (strcmp(passphrase, "") != 0) { 273 authfile, passphrase, NULL); 276 debug2("no passphrase given, try next key"); 279 memset(passphrase, 0, strlen(passphrase)); [all...] |
H A D | sshconnect2.c | 1172 char prompt[300], *passphrase; local 1185 gettext("Enter passphrase for key '%.100s': "), filename); 1187 passphrase = read_passphrase(prompt, 0); 1188 if (strcmp(passphrase, "") != 0) { 1190 passphrase, NULL); 1193 debug2("no passphrase given, try next key"); 1196 memset(passphrase, 0, strlen(passphrase)); 1197 xfree(passphrase); 1200 debug2("bad passphrase give [all...] |
/opensolaris-onvv-gate/usr/src/cmd/print/bsd-sysv-commands/ |
H A D | common.c | 591 char *user, *svc_name, *passphrase; local 609 gettext("passphrase for %s to access %s: "), user, svc_name); 611 /* ask for the passphrase */ 612 if ((passphrase = getpassphrase(prompt)) != NULL) 613 papiServiceSetPassword(svc, passphrase);
|
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/ |
H A D | keystore.c | 60 char *passphrase; member in struct:keystore_t 444 tmpstore->passphrase = NULL; 472 if (keystore->passphrase != NULL) 473 free(keystore->passphrase); 1687 if (sunw_PKCS12_contents(p12, keystore->passphrase, 1745 keystore->passphrase) == B_FALSE) { 1759 if (sunw_PKCS12_contents(p12, keystore->passphrase, 1796 keystore->passphrase) == B_FALSE) { 1805 if (sunw_PKCS12_contents(p12, keystore->passphrase, 1841 * keystore password is set in keystore->passphrase [all...] |
H A D | pkgweb.c | 164 * passphrase callback routine. 178 * Description: Specifies the passphrase retrieval method 180 * passphrase callback routine. 3103 * a passphrase is needed. This routine collects 3104 * a passphrase from the user using the given 3105 * passphrase retrieval method set with 3111 * Arguments: buf - Buffer to copy passphrase into 3113 * rw - Whether this passphrase is needed 3117 * a passphrase for writing something. 3122 * Returns: Length of passphrase collecte 3134 char *passphrase; local [all...] |
/opensolaris-onvv-gate/usr/src/cmd/tsol/misc/ |
H A D | txzonemgr.sh | 342 pass1=$(zenity --entry --title="$title" --text="Enter passphrase:" \ 344 pass2=$(zenity --entry --title="$title" --text="Re-enter passphrase:" \ 388 keysource="passphrase,file://$file" 408 zfs set keysource=passphrase,prompt $ZDSET
|