HomeSort by: relevance | last modified time | path
    Searched defs:passphrase (Results 1 - 25 of 27) sorted by relevancy

1 2

  /src/crypto/external/bsd/netpgp/dist/src/librsa/
rsastubs.c 41 char *passphrase; local
45 snprintf(prompt, sizeof(prompt), "\"%s\" passphrase: ", (char *)u);
46 if ((passphrase = getpass(prompt)) == NULL) {
49 (void) memcpy(buf, passphrase, (size_t)size);
50 return (int)strlen(passphrase);
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
21 char *ssid, *passphrase, buf[64], *pos; local
25 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
26 "\nIf passphrase is left out, it will be read from "
34 passphrase = argv[2];
38 fprintf(stderr, "# reading passphrase from stdin\n");
50 fprintf(stderr, "Failed to read passphrase\n");
67 passphrase = buf;
70 len = os_strlen(passphrase);
72 fprintf(stderr, "Passphrase must be 8..63 characters\n")
    [all...]
config_ssid.h 227 * passphrase - WPA ASCII passphrase
229 * If this is set, psk will be generated using the SSID and passphrase
230 * configured for the network. ASCII passphrase must be between 8 and
233 char *passphrase; member in struct:wpa_ssid
239 * passphrase value is used if this separate parameter is not used, but
240 * passphrase follows the WPA-PSK constraints (8..63 characters) even
256 * ext_psk - PSK/passphrase name in external storage
258 * If this is set, PSK/passphrase will be fetched from external storage
264 * mem_only_psk - Whether to keep PSK/passphrase only in memor
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/otp/
otptest.c 72 char *passphrase; member in struct:test
127 if(alg->init (key, t->passphrase, t->seed))
  /src/external/bsd/libarchive/dist/libarchive/
archive_read_add_passphrase.c 66 new_read_passphrase(struct archive_read *a, const char *passphrase)
76 p->passphrase = strdup(passphrase);
77 if (p->passphrase == NULL) {
87 archive_read_add_passphrase(struct archive *_a, const char *passphrase)
95 if (passphrase == NULL || passphrase[0] == '\0') {
97 "Empty passphrase is unacceptable");
101 p = new_read_passphrase(a, passphrase);
124 * Call this in advance when you start to get a passphrase for decryptio
141 const char *passphrase; local
    [all...]
archive_write_private.h 128 * Encryption passphrase.
130 char *passphrase; member in struct:archive_write
161 * Get an encryption passphrase.
archive_read_private.h 146 char *passphrase; member in struct:archive_read_passphrase
218 * Decryption passphrase.
261 * Get a decryption passphrase.
archive_write_set_format_zip.c 2390 const char *passphrase; local
2395 passphrase = __archive_write_get_passphrase(a);
2396 if (passphrase == NULL) {
2398 "Encryption needs passphrase");
2406 trad_enc_init(&zip->tctx, passphrase, strlen(passphrase));
2408 * for verifying passphrase in decryption. */
2425 const char *passphrase; local
2431 passphrase = __archive_write_get_passphrase(a);
2432 if (passphrase == NULL)
    [all...]
archive_read_support_format_zip.c 2944 const char *passphrase; local
2947 passphrase = __archive_read_next_passphrase(a);
2948 if (passphrase == NULL) {
2951 "Incorrect passphrase":
2952 "Passphrase required for this entry");
2959 r = trad_enc_init(&zip->tctx, passphrase, strlen(passphrase),
2962 break;/* The passphrase is OK. */
3009 const char *passphrase; local
3011 passphrase = __archive_read_next_passphrase(a)
    [all...]
  /src/lib/libpam/modules/pam_ssh/
pam_ssh.c 80 static const char *pam_ssh_prompt = "SSH passphrase: ";
97 * directory, using the specified passphrase. If successful, returns a
101 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase,
114 * If the key is unencrypted, OpenSSL ignores the passphrase, so
116 * a user to circumvent nullok by providing a dummy passphrase.
118 * with an empty passphrase, and if the key is not encrypted,
119 * accept only an empty passphrase.
122 if (r == 0 && !(*passphrase == '\0' && nullok)) {
129 r = sshkey_load_private(fn, passphrase, &key, &comment);
167 const char **kfn, *passphrase, *user local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
provider_pkey_test.c 436 const char *passphrase = FAKE_PASSPHRASE; local
439 UI_set_result(ui, uis, passphrase);
  /src/external/bsd/wpa/dist/src/ap/
ieee802_11_auth.c 417 char *passphrase; local
425 passphrase = radius_msg_get_tunnel_password(
429 * Passphrase is NULL iff there is no i-th Tunnel-Password
432 if (!passphrase)
445 * passphrase does not contain the NULL termination.
451 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
459 os_memcpy(psk->passphrase, passphrase,
470 os_free(passphrase);
  /src/crypto/external/bsd/netpgp/dist/src/lib/
crypto.h 248 char *passphrase; member in struct:pgp_cryptinfo_t
263 void *passfp; /* fp for passphrase input */
267 int numtries; /* # of passphrase attempts */
268 int gotpass; /* when passphrase entered */
keyring.c 225 char *passphrase; member in struct:__anon990
250 *content->skey_passphrase.passphrase = netpgp_strdup(pass);
257 /* Generally this means a bad passphrase */
258 fprintf(stderr, "Bad passphrase!\n");
304 *content->skey_passphrase.passphrase = netpgp_strdup("");
313 \brief Decrypts secret key from given keydata with given passphrase
315 \param passphrase Passphrase to use to decrypt secret key
325 /* XXX first try with an empty passphrase */
336 /* ask for a passphrase */
    [all...]
netpgp.c 313 writekeyring(netpgp_t *netpgp, const char *name, pgp_keyring_t *keyring, uint8_t *passphrase)
319 if (!pgp_keyring_filewrite(keyring, noarmor, filename, passphrase)) {
752 /* get the passphrase from the user */
754 find_passphrase(FILE *passfp, const char *id, char *passphrase, size_t size, int attempts)
763 if (fgets(passphrase, (int)size, passfp) == NULL) {
766 return (int)strlen(passphrase);
769 (void) snprintf(prompt, sizeof(prompt), "Enter passphrase for %.16s: ", id);
774 (void) snprintf(prompt, sizeof(prompt), "Repeat passphrase for %.16s: ", id);
778 cc = snprintf(passphrase, size, "%s", cp);
779 if (strcmp(buf, passphrase) == 0)
1239 char passphrase[128]; local
    [all...]
packet-parse.c 907 if (skp->passphrase && *skp->passphrase) {
908 free(*skp->passphrase);
909 *skp->passphrase = NULL;
2486 char *passphrase; local
2505 passphrase = NULL;
2506 seckey.u.skey_passphrase.passphrase = &passphrase;
2509 if (!passphrase) {
2513 "parse_seckey: can't get passphrase\n")
    [all...]
packet.h 833 char **passphrase; /* point somewhere that gets filled member in struct:__anon1040
  /src/external/bsd/libarchive/dist/cpio/
cpio.h 56 const char *passphrase; member in struct:cpio
  /src/external/bsd/libarchive/dist/tar/
bsdtar.h 50 const char *passphrase; /* --passphrase */ member in struct:bsdtar
  /src/crypto/external/bsd/openssh/dist/
sshconnect2.c 1558 char prompt[300], *passphrase, *comment; local
1569 "Enter passphrase for key '%.100s': ", id->filename);
1572 passphrase = xstrdup("");
1574 passphrase = read_passphrase(prompt, 0);
1575 if (*passphrase == '\0') {
1576 debug2("no passphrase given, try next key");
1577 free(passphrase);
1582 passphrase, &private, &comment))) {
1591 debug2("bad passphrase given, try again...");
1623 passphrase);
    [all...]
ssh-keygen.c 95 /* This is set to the passphrase if given on the command line. */
98 /* This is set to the new passphrase if given on the command line. */
300 xasprintf(&prompt, "Enter passphrase for \"%s\": ", filename);
1339 * Perform changing a passphrase. The argument is the passwd structure
1355 /* Try to load the file with empty passphrase. */
1362 read_passphrase("Enter old passphrase: ",
1376 /* Ask the new passphrase (twice). */
1382 read_passphrase("Enter new passphrase (empty for no "
1383 "passphrase): ", RP_ALLOW_STDIN);
1384 passphrase2 = read_passphrase("Enter same passphrase again: "
1463 char new_comment[1024], *comment, *passphrase; local
3272 char comment[1024], *passphrase = NULL; local
    [all...]
sshkey.c 2781 const char *passphrase, const char *comment, const char *ciphername,
2796 if (passphrase == NULL || !strlen(passphrase)) {
2822 if (bcrypt_pbkdf(passphrase, strlen(passphrase),
2980 private2_decrypt(struct sshbuf *decoded, const char *passphrase,
3034 if ((passphrase == NULL || strlen(passphrase) == 0) &&
3036 /* passphrase required */
3060 if (bcrypt_pbkdf(passphrase, strlen(passphrase), salt, slen
3245 u_char *passphrase = (len > 0) ? __UNCONST(_passphrase) : NULL; local
    [all...]
  /src/external/bsd/wpa/dist/src/crypto/
crypto_module_tests.c 1222 char *passphrase; member in struct:passphrase_test
1332 #if 0 /* \0 not currently supported in passphrase parameters.. */
1386 wpa_printf(MSG_INFO, "PBKDF2-SHA1 Passphrase test cases:");
1391 if (pbkdf2_sha1(test->passphrase,
  /src/external/bsd/wpa/dist/src/p2p/
p2p.h 136 * passphrase - WPA2-Personal passphrase for the group (GO only)
138 char passphrase[64]; member in struct:p2p_go_neg_results
585 * passphrase_len - Passphrase length (8..63)
587 * This parameter controls the length of the random passphrase that is
  /src/external/bsd/wpa/dist/src/common/
dpp.h 262 char *passphrase; member in struct:dpp_configuration
358 char passphrase[64]; member in struct:dpp_authentication::dpp_config_obj

Completed in 52 milliseconds

1 2