| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 21 char *ssid, *passphrase, buf[64], *pos; local 25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 26 "\nIf passphrase is left out, it will be read from " 34 passphrase = argv[2]; 38 fprintf(stderr, "# reading passphrase from stdin\n"); 50 fprintf(stderr, "Failed to read passphrase\n"); 67 passphrase = buf; 70 len = os_strlen(passphrase); 72 fprintf(stderr, "Passphrase must be 8..63 characters\n") [all...] |
| /src/crypto/external/bsd/openssl/dist/demos/encode/ |
| ec_encode.c | 27 * supplied passphrase. 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) 55 * Set passphrase if provided; needed to decrypt encrypted PEM files. 56 * If the input is not encrypted, any passphrase provided is ignored. 60 * interactive applications which do not know if a passphrase should be 63 if (passphrase != NULL) { 65 (const unsigned char *)passphrase, 66 strlen(passphrase)) == 0) { 98 * If a passphrase is supplied, the file is encrypted, otherwise 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) [all...] |
| rsa_encode.c | 27 * supplied passphrase. 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) 55 * Set passphrase if provided; needed to decrypt encrypted PEM files. 56 * If the input is not encrypted, any passphrase provided is ignored. 60 * interactive applications which do not know if a passphrase should be 63 if (passphrase != NULL) { 65 (const unsigned char *)passphrase, 66 strlen(passphrase)) == 0) { 98 * If a passphrase is supplied, the file is encrypted, otherwise 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) [all...] |
| /src/external/bsd/libarchive/dist/libarchive/ |
| archive_read_add_passphrase.c | 66 new_read_passphrase(struct archive_read *a, const char *passphrase) 76 p->passphrase = strdup(passphrase); 77 if (p->passphrase == NULL) { 87 archive_read_add_passphrase(struct archive *_a, const char *passphrase) 95 if (passphrase == NULL || passphrase[0] == '\0') { 97 "Empty passphrase is unacceptable"); 101 p = new_read_passphrase(a, passphrase); 124 * Call this in advance when you start to get a passphrase for decryptio 141 const char *passphrase; local [all...] |
| archive_write_set_passphrase.c | 38 "Empty passphrase is unacceptable"); 41 free(a->passphrase); 42 a->passphrase = strdup(p); 43 if (a->passphrase == NULL) { 45 "Can't allocate data for passphrase"); 83 if (a->passphrase != NULL) 84 return (a->passphrase); 94 return (a->passphrase);
|
| archive_write_private.h | 128 * Encryption passphrase. 130 char *passphrase; member in struct:archive_write 161 * Get an encryption passphrase.
|
| /src/crypto/external/apache2/openssl/dist/demos/encode/ |
| ec_encode.c | 27 * supplied passphrase. 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) 55 * Set passphrase if provided; needed to decrypt encrypted PEM files. 56 * If the input is not encrypted, any passphrase provided is ignored. 60 * interactive applications which do not know if a passphrase should be 63 if (passphrase != NULL) { 65 (const unsigned char *)passphrase, 66 strlen(passphrase)) 99 * If a passphrase is supplied, the file is encrypted, otherwise 102 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) [all...] |
| rsa_encode.c | 27 * supplied passphrase. 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) 55 * Set passphrase if provided; needed to decrypt encrypted PEM files. 56 * If the input is not encrypted, any passphrase provided is ignored. 60 * interactive applications which do not know if a passphrase should be 63 if (passphrase != NULL) { 65 (const unsigned char *)passphrase, 66 strlen(passphrase)) 99 * If a passphrase is supplied, the file is encrypted, otherwise 102 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 62 * @passphrase: ASCII passphrase 74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
| sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
| /src/crypto/external/bsd/netpgp/dist/src/librsa/ |
| rsastubs.c | 41 char *passphrase; local 45 snprintf(prompt, sizeof(prompt), "\"%s\" passphrase: ", (char *)u); 46 if ((passphrase = getpass(prompt)) == NULL) { 49 (void) memcpy(buf, passphrase, (size_t)size); 50 return (int)strlen(passphrase);
|
| /src/external/bsd/libarchive/lib/libarchive_fe/ |
| Makefile | 10 SRCS= lafe_err.c line_reader.c passphrase.c
|
| /src/crypto/external/bsd/openssh/dist/ |
| authfile.h | 46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
|
| authfile.c | 63 const char *passphrase, const char *comment, 71 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, 109 sshkey_load_private_type(int type, const char *filename, const char *passphrase, 126 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); 133 sshkey_load_private(const char *filename, const char *passphrase, 136 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, 141 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, 151 passphrase, keyp, commentp)) != 0) 308 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, 330 passphrase, &key, NULL)) != 0 | [all...] |
| sshkey.h | 286 const char *passphrase, const char *comment, 289 const char *passphrase, struct sshkey **keyp, char **commentp); 291 const char *passphrase, struct sshkey **keyp, char **commentp);
|
| /src/external/gpl3/autoconf/dist/build-aux/ |
| gnupload | 218 # for the passphrase if the script will fail. 237 # Make sure passphrase is not exported in the environment. 238 unset passphrase 241 # 'echo $passphrase' to output the passphrase, so it is important that 246 PATH=/empty echo -n "Enter GPG passphrase: " 248 read -r passphrase 257 echo "$passphrase" | $dbg $GPG --passphrase-fd 0 -ba -o $file.sig $file 315 echo "$passphrase" | $dbg $GPG --passphrase-fd 0 --clearsign $base.directiv [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/otp/ |
| otptest.c | 72 char *passphrase; member in struct:test 127 if(alg->init (key, t->passphrase, t->seed))
|
| /src/lib/libpam/modules/pam_ssh/ |
| pam_ssh.c | 80 static const char *pam_ssh_prompt = "SSH passphrase: "; 97 * directory, using the specified passphrase. If successful, returns a 101 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase, 114 * If the key is unencrypted, OpenSSL ignores the passphrase, so 116 * a user to circumvent nullok by providing a dummy passphrase. 118 * with an empty passphrase, and if the key is not encrypted, 119 * accept only an empty passphrase. 122 if (r == 0 && !(*passphrase == '\0' && nullok)) { 129 r = sshkey_load_private(fn, passphrase, &key, &comment); 167 const char **kfn, *passphrase, *user local [all...] |
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| passphrase.h | 15 * This is a passphrase reader bridge with bells and whistles. 17 * On one hand, an API may wish to offer all sorts of passphrase callback 24 * passphrase callback form to another. 29 * that the same passphrase may be asked for more than once, but the 31 * useful for OSSL_DECODER, which may have to use a passphrase while 43 is_expl_passphrase = 1, /* Explicit passphrase given by user */ 91 const unsigned char *passphrase,
|
| /src/crypto/external/bsd/openssl/dist/include/internal/ |
| passphrase.h | 15 * This is a passphrase reader bridge with bells and whistles. 17 * On one hand, an API may wish to offer all sorts of passphrase callback 24 * passphrase callback form to another. 29 * that the same passphrase may be asked for more than once, but the 31 * useful for OSSL_DECODER, which may have to use a passphrase while 43 is_expl_passphrase = 1, /* Explicit passphrase given by user */ 91 const unsigned char *passphrase,
|
| /src/external/bsd/libarchive/dist/cpio/ |
| cpio.h | 56 const char *passphrase; member in struct:cpio
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11_auth.c | 417 char *passphrase; local 425 passphrase = radius_msg_get_tunnel_password( 429 * Passphrase is NULL iff there is no i-th Tunnel-Password 432 if (!passphrase) 445 * passphrase does not contain the NULL termination. 451 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 459 os_memcpy(psk->passphrase, passphrase, 470 os_free(passphrase);
|
| /src/crypto/external/apache2/openssl/dist/crypto/ |
| passphrase.c | 14 #include "internal/passphrase.h" 34 const unsigned char *passphrase, 37 if (!ossl_assert(data != NULL && passphrase != NULL)) { 43 data->_.expl_passphrase.passphrase_copy = passphrase_len != 0 ? OPENSSL_memdup(passphrase, passphrase_len)
|
| /src/crypto/external/bsd/openssl/dist/crypto/ |
| passphrase.c | 14 #include "internal/passphrase.h" 34 const unsigned char *passphrase, 37 if (!ossl_assert(data != NULL && passphrase != NULL)) { 44 passphrase_len != 0 ? OPENSSL_memdup(passphrase, passphrase_len)
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| keyring.c | 225 char *passphrase; member in struct:__anon990 250 *content->skey_passphrase.passphrase = netpgp_strdup(pass); 257 /* Generally this means a bad passphrase */ 258 fprintf(stderr, "Bad passphrase!\n"); 304 *content->skey_passphrase.passphrase = netpgp_strdup(""); 313 \brief Decrypts secret key from given keydata with given passphrase 315 \param passphrase Passphrase to use to decrypt secret key 325 /* XXX first try with an empty passphrase */ 336 /* ask for a passphrase */ [all...] |