| /src/crypto/external/bsd/netpgp/dist/src/librsa/ |
| rsastubs.c | 41 char *passphrase; local 45 snprintf(prompt, sizeof(prompt), "\"%s\" passphrase: ", (char *)u); 46 if ((passphrase = getpass(prompt)) == NULL) { 49 (void) memcpy(buf, passphrase, (size_t)size); 50 return (int)strlen(passphrase);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 21 char *ssid, *passphrase, buf[64], *pos; local 25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 26 "\nIf passphrase is left out, it will be read from " 34 passphrase = argv[2]; 38 fprintf(stderr, "# reading passphrase from stdin\n"); 50 fprintf(stderr, "Failed to read passphrase\n"); 67 passphrase = buf; 70 len = os_strlen(passphrase); 72 fprintf(stderr, "Passphrase must be 8..63 characters\n") [all...] |
| config_ssid.h | 227 * passphrase - WPA ASCII passphrase 229 * If this is set, psk will be generated using the SSID and passphrase 230 * configured for the network. ASCII passphrase must be between 8 and 233 char *passphrase; member in struct:wpa_ssid 239 * passphrase value is used if this separate parameter is not used, but 240 * passphrase follows the WPA-PSK constraints (8..63 characters) even 256 * ext_psk - PSK/passphrase name in external storage 258 * If this is set, PSK/passphrase will be fetched from external storage 264 * mem_only_psk - Whether to keep PSK/passphrase only in memor [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/otp/ |
| otptest.c | 72 char *passphrase; member in struct:test 127 if(alg->init (key, t->passphrase, t->seed))
|
| /src/external/bsd/libarchive/dist/libarchive/ |
| archive_read_add_passphrase.c | 66 new_read_passphrase(struct archive_read *a, const char *passphrase) 76 p->passphrase = strdup(passphrase); 77 if (p->passphrase == NULL) { 87 archive_read_add_passphrase(struct archive *_a, const char *passphrase) 95 if (passphrase == NULL || passphrase[0] == '\0') { 97 "Empty passphrase is unacceptable"); 101 p = new_read_passphrase(a, passphrase); 124 * Call this in advance when you start to get a passphrase for decryptio 141 const char *passphrase; local [all...] |
| archive_write_private.h | 128 * Encryption passphrase. 130 char *passphrase; member in struct:archive_write 161 * Get an encryption passphrase.
|
| archive_read_private.h | 146 char *passphrase; member in struct:archive_read_passphrase 218 * Decryption passphrase. 261 * Get a decryption passphrase.
|
| archive_write_set_format_zip.c | 2390 const char *passphrase; local 2395 passphrase = __archive_write_get_passphrase(a); 2396 if (passphrase == NULL) { 2398 "Encryption needs passphrase"); 2406 trad_enc_init(&zip->tctx, passphrase, strlen(passphrase)); 2408 * for verifying passphrase in decryption. */ 2425 const char *passphrase; local 2431 passphrase = __archive_write_get_passphrase(a); 2432 if (passphrase == NULL) [all...] |
| archive_read_support_format_zip.c | 2944 const char *passphrase; local 2947 passphrase = __archive_read_next_passphrase(a); 2948 if (passphrase == NULL) { 2951 "Incorrect passphrase": 2952 "Passphrase required for this entry"); 2959 r = trad_enc_init(&zip->tctx, passphrase, strlen(passphrase), 2962 break;/* The passphrase is OK. */ 3009 const char *passphrase; local 3011 passphrase = __archive_read_next_passphrase(a) [all...] |
| /src/lib/libpam/modules/pam_ssh/ |
| pam_ssh.c | 80 static const char *pam_ssh_prompt = "SSH passphrase: "; 97 * directory, using the specified passphrase. If successful, returns a 101 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, 114 * If the key is unencrypted, OpenSSL ignores the passphrase, so 116 * a user to circumvent nullok by providing a dummy passphrase. 118 * with an empty passphrase, and if the key is not encrypted, 119 * accept only an empty passphrase. 122 if (r == 0 && !(*passphrase == '\0' && nullok)) { 129 r = sshkey_load_private(fn, passphrase, &key, &comment); 167 const char **kfn, *passphrase, *user local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| provider_pkey_test.c | 436 const char *passphrase = FAKE_PASSPHRASE; local 439 UI_set_result(ui, uis, passphrase);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11_auth.c | 417 char *passphrase; local 425 passphrase = radius_msg_get_tunnel_password( 429 * Passphrase is NULL iff there is no i-th Tunnel-Password 432 if (!passphrase) 445 * passphrase does not contain the NULL termination. 451 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 459 os_memcpy(psk->passphrase, passphrase, 470 os_free(passphrase);
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| crypto.h | 248 char *passphrase; member in struct:pgp_cryptinfo_t 263 void *passfp; /* fp for passphrase input */ 267 int numtries; /* # of passphrase attempts */ 268 int gotpass; /* when passphrase entered */
|
| keyring.c | 225 char *passphrase; member in struct:__anon990 250 *content->skey_passphrase.passphrase = netpgp_strdup(pass); 257 /* Generally this means a bad passphrase */ 258 fprintf(stderr, "Bad passphrase!\n"); 304 *content->skey_passphrase.passphrase = netpgp_strdup(""); 313 \brief Decrypts secret key from given keydata with given passphrase 315 \param passphrase Passphrase to use to decrypt secret key 325 /* XXX first try with an empty passphrase */ 336 /* ask for a passphrase */ [all...] |
| netpgp.c | 313 writekeyring(netpgp_t *netpgp, const char *name, pgp_keyring_t *keyring, uint8_t *passphrase) 319 if (!pgp_keyring_filewrite(keyring, noarmor, filename, passphrase)) { 752 /* get the passphrase from the user */ 754 find_passphrase(FILE *passfp, const char *id, char *passphrase, size_t size, int attempts) 763 if (fgets(passphrase, (int)size, passfp) == NULL) { 766 return (int)strlen(passphrase); 769 (void) snprintf(prompt, sizeof(prompt), "Enter passphrase for %.16s: ", id); 774 (void) snprintf(prompt, sizeof(prompt), "Repeat passphrase for %.16s: ", id); 778 cc = snprintf(passphrase, size, "%s", cp); 779 if (strcmp(buf, passphrase) == 0) 1239 char passphrase[128]; local [all...] |
| packet-parse.c | 907 if (skp->passphrase && *skp->passphrase) { 908 free(*skp->passphrase); 909 *skp->passphrase = NULL; 2486 char *passphrase; local 2505 passphrase = NULL; 2506 seckey.u.skey_passphrase.passphrase = &passphrase; 2509 if (!passphrase) { 2513 "parse_seckey: can't get passphrase\n") [all...] |
| packet.h | 833 char **passphrase; /* point somewhere that gets filled member in struct:__anon1040
|
| /src/external/bsd/libarchive/dist/cpio/ |
| cpio.h | 56 const char *passphrase; member in struct:cpio
|
| /src/external/bsd/libarchive/dist/tar/ |
| bsdtar.h | 50 const char *passphrase; /* --passphrase */ member in struct:bsdtar
|
| /src/crypto/external/bsd/openssh/dist/ |
| sshconnect2.c | 1558 char prompt[300], *passphrase, *comment; local 1569 "Enter passphrase for key '%.100s': ", id->filename); 1572 passphrase = xstrdup(""); 1574 passphrase = read_passphrase(prompt, 0); 1575 if (*passphrase == '\0') { 1576 debug2("no passphrase given, try next key"); 1577 free(passphrase); 1582 passphrase, &private, &comment))) { 1591 debug2("bad passphrase given, try again..."); 1623 passphrase); [all...] |
| ssh-keygen.c | 95 /* This is set to the passphrase if given on the command line. */ 98 /* This is set to the new passphrase if given on the command line. */ 300 xasprintf(&prompt, "Enter passphrase for \"%s\": ", filename); 1339 * Perform changing a passphrase. The argument is the passwd structure 1355 /* Try to load the file with empty passphrase. */ 1362 read_passphrase("Enter old passphrase: ", 1376 /* Ask the new passphrase (twice). */ 1382 read_passphrase("Enter new passphrase (empty for no " 1383 "passphrase): ", RP_ALLOW_STDIN); 1384 passphrase2 = read_passphrase("Enter same passphrase again: " 1463 char new_comment[1024], *comment, *passphrase; local 3272 char comment[1024], *passphrase = NULL; local [all...] |
| sshkey.c | 2781 const char *passphrase, const char *comment, const char *ciphername, 2796 if (passphrase == NULL || !strlen(passphrase)) { 2822 if (bcrypt_pbkdf(passphrase, strlen(passphrase), 2980 private2_decrypt(struct sshbuf *decoded, const char *passphrase, 3034 if ((passphrase == NULL || strlen(passphrase) == 0) && 3036 /* passphrase required */ 3060 if (bcrypt_pbkdf(passphrase, strlen(passphrase), salt, slen 3245 u_char *passphrase = (len > 0) ? __UNCONST(_passphrase) : NULL; local [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_module_tests.c | 1222 char *passphrase; member in struct:passphrase_test 1332 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1386 wpa_printf(MSG_INFO, "PBKDF2-SHA1 Passphrase test cases:"); 1391 if (pbkdf2_sha1(test->passphrase,
|
| /src/external/bsd/wpa/dist/src/p2p/ |
| p2p.h | 136 * passphrase - WPA2-Personal passphrase for the group (GO only) 138 char passphrase[64]; member in struct:p2p_go_neg_results 585 * passphrase_len - Passphrase length (8..63) 587 * This parameter controls the length of the random passphrase that is
|
| /src/external/bsd/wpa/dist/src/common/ |
| dpp.h | 262 char *passphrase; member in struct:dpp_configuration 358 char passphrase[64]; member in struct:dpp_authentication::dpp_config_obj
|