Searched refs:passphrase (Results 1 - 16 of 16) sorted by relevance

/opensolaris-onvv-gate/usr/src/cmd/ssh/libssh/common/
H A Dauthfile.c6 * for reading the passphrase from the user.
63 * passphrase. The identification of the file (lowest 64 bits of n) will
65 * passphrase.
69 key_save_private_rsa1(Key *key, const char *filename, const char *passphrase, argument
80 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
83 cipher_num = (strcmp(passphrase, "") == 0) ?
91 /* Put checkbytes for checking passphrase validity. */
134 cipher_set_key_string(&ciphercontext, cipher, passphrase,
173 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
177 error("passphrase to
206 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument
313 key_load_private_rsa1(int fd, const char *filename, const char *passphrase, char **commentp) argument
427 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument
506 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp) argument
539 key_load_private(const char *filename, const char *passphrase, char **commentp) argument
[all...]
H A Dcipher.c277 * passphrase and using the resulting 16 bytes as the key.
282 const char *passphrase, int encrypt)
288 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
281 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int encrypt) argument
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm.c83 * Read a passphrase from the file into the supplied buffer.
86 * Return 0 when no valid passphrase was found in the file.
123 char *passphrase = getpassphrase("Enter passphrase: "); local
124 if (passphrase) {
125 return (strlcpy(buf, passphrase, buf_size));
/opensolaris-onvv-gate/usr/src/lib/pkcs11/include/
H A Dcryptoki.h115 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2
119 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase,
134 * given passphrase. The caller is responsible to free the allocated
138 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase,
/opensolaris-onvv-gate/usr/src/cmd/ssh/ssh-keygen/
H A Dssh-keygen.c42 * Flag indicating that we just want to change the passphrase. This can be
70 /* This is set to the passphrase if given on the command line. */
73 /* This is set to the new passphrase if given on the command line. */
142 pass = read_passphrase(gettext("Enter passphrase: "),
727 * Perform changing a passphrase. The argument is the passwd structure
744 /* Try to load the file with empty passphrase. */
751 read_passphrase(gettext("Enter old passphrase: "),
758 printf(gettext("Bad passphrase.\n"));
764 /* Ask the new passphrase (twice). */
770 read_passphrase(gettext("Enter new passphrase (empt
816 char new_comment[1024], *comment, *passphrase; local
[all...]
/opensolaris-onvv-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11SUNWExtensions.c371 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2
377 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, argument
390 passphrase == NULL || passphrase_len == 0 ||
440 params.pPassword = (CK_UTF8CHAR_PTR)passphrase;
502 * secret key object from a passphrase, an app may call pkcs11_ObjectToKey
558 * given passphrase. The caller is responsible to free the allocated
562 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase, argument
569 rv = pkcs11_PasswdToPBKD2Object(hSession, passphrase, passphrase_len,
/opensolaris-onvv-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dipp-support.c422 char *user, *passphrase; local
442 /* if the passphrase is not set, use the Authentication Callback */
446 passphrase = svc->password;
448 /* if there is still no passphrase, we have to fail */
449 if ((passphrase == NULL) || (passphrase[0] == '\0'))
456 snprintf(plain, sizeof (plain), "%s:%s", user, passphrase);
475 passphrase);
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa_enc.c205 pbkdf2_sha1(char *passphrase, char *ssid, size_t ssid_len, int iterations, argument
208 (void) PKCS5_PBKDF2_HMAC_SHA1(passphrase, -1, (unsigned char *)ssid,
H A Dwpa_impl.h246 char *passphrase; member in struct:wpa_ssid
H A Dwpa_supplicant.c706 ssid->passphrase = strdup((const char *)psk);
708 if (ssid->passphrase) {
709 pbkdf2_sha1(ssid->passphrase, (char *)ssid->ssid,
711 wpa_hexdump(MSG_MSGDUMP, "PSK (from passphrase)",
759 free(ssid->passphrase);
/opensolaris-onvv-gate/usr/src/cmd/ssh/ssh/
H A Dsshconnect1.c217 char buf[300], *passphrase, *comment, *authfile; local
258 * load the private key. Try first with empty passphrase; if it
259 * fails, ask for a passphrase.
267 gettext("Enter passphrase for RSA key '%.100s': "),
270 passphrase = read_passphrase(buf, 0);
271 if (strcmp(passphrase, "") != 0) {
273 authfile, passphrase, NULL);
276 debug2("no passphrase given, try next key");
279 memset(passphrase, 0, strlen(passphrase));
[all...]
H A Dsshconnect2.c1172 char prompt[300], *passphrase; local
1185 gettext("Enter passphrase for key '%.100s': "), filename);
1187 passphrase = read_passphrase(prompt, 0);
1188 if (strcmp(passphrase, "") != 0) {
1190 passphrase, NULL);
1193 debug2("no passphrase given, try next key");
1196 memset(passphrase, 0, strlen(passphrase));
1197 xfree(passphrase);
1200 debug2("bad passphrase give
[all...]
/opensolaris-onvv-gate/usr/src/cmd/print/bsd-sysv-commands/
H A Dcommon.c591 char *user, *svc_name, *passphrase; local
609 gettext("passphrase for %s to access %s: "), user, svc_name);
611 /* ask for the passphrase */
612 if ((passphrase = getpassphrase(prompt)) != NULL)
613 papiServiceSetPassword(svc, passphrase);
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/
H A Dkeystore.c60 char *passphrase; member in struct:keystore_t
444 tmpstore->passphrase = NULL;
472 if (keystore->passphrase != NULL)
473 free(keystore->passphrase);
1687 if (sunw_PKCS12_contents(p12, keystore->passphrase,
1745 keystore->passphrase) == B_FALSE) {
1759 if (sunw_PKCS12_contents(p12, keystore->passphrase,
1796 keystore->passphrase) == B_FALSE) {
1805 if (sunw_PKCS12_contents(p12, keystore->passphrase,
1841 * keystore password is set in keystore->passphrase
[all...]
H A Dpkgweb.c164 * passphrase callback routine.
178 * Description: Specifies the passphrase retrieval method
180 * passphrase callback routine.
3103 * a passphrase is needed. This routine collects
3104 * a passphrase from the user using the given
3105 * passphrase retrieval method set with
3111 * Arguments: buf - Buffer to copy passphrase into
3113 * rw - Whether this passphrase is needed
3117 * a passphrase for writing something.
3122 * Returns: Length of passphrase collecte
3134 char *passphrase; local
[all...]
/opensolaris-onvv-gate/usr/src/cmd/tsol/misc/
H A Dtxzonemgr.sh342 pass1=$(zenity --entry --title="$title" --text="Enter passphrase:" \
344 pass2=$(zenity --entry --title="$title" --text="Re-enter passphrase:" \
388 keysource="passphrase,file://$file"
408 zfs set keysource=passphrase,prompt $ZDSET

Completed in 154 milliseconds