HomeSort by: relevance | last modified time | path
    Searched refs:passphrase (Results 1 - 25 of 81) sorted by relevancy

1 2 3 4

  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
21 char *ssid, *passphrase, buf[64], *pos; local
25 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
26 "\nIf passphrase is left out, it will be read from "
34 passphrase = argv[2];
38 fprintf(stderr, "# reading passphrase from stdin\n");
50 fprintf(stderr, "Failed to read passphrase\n");
67 passphrase = buf;
70 len = os_strlen(passphrase);
72 fprintf(stderr, "Passphrase must be 8..63 characters\n")
    [all...]
  /src/crypto/external/bsd/openssl/dist/demos/encode/
ec_encode.c 27 * supplied passphrase.
29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase)
55 * Set passphrase if provided; needed to decrypt encrypted PEM files.
56 * If the input is not encrypted, any passphrase provided is ignored.
60 * interactive applications which do not know if a passphrase should be
63 if (passphrase != NULL) {
65 (const unsigned char *)passphrase,
66 strlen(passphrase)) == 0) {
98 * If a passphrase is supplied, the file is encrypted, otherwise
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase)
    [all...]
rsa_encode.c 27 * supplied passphrase.
29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase)
55 * Set passphrase if provided; needed to decrypt encrypted PEM files.
56 * If the input is not encrypted, any passphrase provided is ignored.
60 * interactive applications which do not know if a passphrase should be
63 if (passphrase != NULL) {
65 (const unsigned char *)passphrase,
66 strlen(passphrase)) == 0) {
98 * If a passphrase is supplied, the file is encrypted, otherwise
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase)
    [all...]
  /src/external/bsd/libarchive/dist/libarchive/
archive_read_add_passphrase.c 66 new_read_passphrase(struct archive_read *a, const char *passphrase)
76 p->passphrase = strdup(passphrase);
77 if (p->passphrase == NULL) {
87 archive_read_add_passphrase(struct archive *_a, const char *passphrase)
95 if (passphrase == NULL || passphrase[0] == '\0') {
97 "Empty passphrase is unacceptable");
101 p = new_read_passphrase(a, passphrase);
124 * Call this in advance when you start to get a passphrase for decryptio
141 const char *passphrase; local
    [all...]
archive_write_set_passphrase.c 38 "Empty passphrase is unacceptable");
41 free(a->passphrase);
42 a->passphrase = strdup(p);
43 if (a->passphrase == NULL) {
45 "Can't allocate data for passphrase");
83 if (a->passphrase != NULL)
84 return (a->passphrase);
94 return (a->passphrase);
archive_write_private.h 128 * Encryption passphrase.
130 char *passphrase; member in struct:archive_write
161 * Get an encryption passphrase.
  /src/crypto/external/apache2/openssl/dist/demos/encode/
ec_encode.c 27 * supplied passphrase.
29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase)
55 * Set passphrase if provided; needed to decrypt encrypted PEM files.
56 * If the input is not encrypted, any passphrase provided is ignored.
60 * interactive applications which do not know if a passphrase should be
63 if (passphrase != NULL) {
65 (const unsigned char *)passphrase,
66 strlen(passphrase))
99 * If a passphrase is supplied, the file is encrypted, otherwise
102 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase)
    [all...]
rsa_encode.c 27 * supplied passphrase.
29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase)
55 * Set passphrase if provided; needed to decrypt encrypted PEM files.
56 * If the input is not encrypted, any passphrase provided is ignored.
60 * interactive applications which do not know if a passphrase should be
63 if (passphrase != NULL) {
65 (const unsigned char *)passphrase,
66 strlen(passphrase))
99 * If a passphrase is supplied, the file is encrypted, otherwise
102 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase)
    [all...]
  /src/external/bsd/wpa/dist/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
62 * @passphrase: ASCII passphrase
74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
  /src/crypto/external/bsd/netpgp/dist/src/librsa/
rsastubs.c 41 char *passphrase; local
45 snprintf(prompt, sizeof(prompt), "\"%s\" passphrase: ", (char *)u);
46 if ((passphrase = getpass(prompt)) == NULL) {
49 (void) memcpy(buf, passphrase, (size_t)size);
50 return (int)strlen(passphrase);
  /src/external/bsd/libarchive/lib/libarchive_fe/
Makefile 10 SRCS= lafe_err.c line_reader.c passphrase.c
  /src/crypto/external/bsd/openssh/dist/
authfile.h 46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
authfile.c 63 const char *passphrase, const char *comment,
71 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment,
109 sshkey_load_private_type(int type, const char *filename, const char *passphrase,
126 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp);
133 sshkey_load_private(const char *filename, const char *passphrase,
136 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase,
141 sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
151 passphrase, keyp, commentp)) != 0)
308 sshkey_load_private_cert(int type, const char *filename, const char *passphrase,
330 passphrase, &key, NULL)) != 0 |
    [all...]
sshkey.h 286 const char *passphrase, const char *comment,
289 const char *passphrase, struct sshkey **keyp, char **commentp);
291 const char *passphrase, struct sshkey **keyp, char **commentp);
  /src/external/gpl3/autoconf/dist/build-aux/
gnupload 218 # for the passphrase if the script will fail.
237 # Make sure passphrase is not exported in the environment.
238 unset passphrase
241 # 'echo $passphrase' to output the passphrase, so it is important that
246 PATH=/empty echo -n "Enter GPG passphrase: "
248 read -r passphrase
257 echo "$passphrase" | $dbg $GPG --passphrase-fd 0 -ba -o $file.sig $file
315 echo "$passphrase" | $dbg $GPG --passphrase-fd 0 --clearsign $base.directiv
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/otp/
otptest.c 72 char *passphrase; member in struct:test
127 if(alg->init (key, t->passphrase, t->seed))
  /src/lib/libpam/modules/pam_ssh/
pam_ssh.c 80 static const char *pam_ssh_prompt = "SSH passphrase: ";
97 * directory, using the specified passphrase. If successful, returns a
101 pam_ssh_load_key(const char *dir, const char *kfn, const char *passphrase,
114 * If the key is unencrypted, OpenSSL ignores the passphrase, so
116 * a user to circumvent nullok by providing a dummy passphrase.
118 * with an empty passphrase, and if the key is not encrypted,
119 * accept only an empty passphrase.
122 if (r == 0 && !(*passphrase == '\0' && nullok)) {
129 r = sshkey_load_private(fn, passphrase, &key, &comment);
167 const char **kfn, *passphrase, *user local
    [all...]
  /src/crypto/external/apache2/openssl/dist/include/internal/
passphrase.h 15 * This is a passphrase reader bridge with bells and whistles.
17 * On one hand, an API may wish to offer all sorts of passphrase callback
24 * passphrase callback form to another.
29 * that the same passphrase may be asked for more than once, but the
31 * useful for OSSL_DECODER, which may have to use a passphrase while
43 is_expl_passphrase = 1, /* Explicit passphrase given by user */
91 const unsigned char *passphrase,
  /src/crypto/external/bsd/openssl/dist/include/internal/
passphrase.h 15 * This is a passphrase reader bridge with bells and whistles.
17 * On one hand, an API may wish to offer all sorts of passphrase callback
24 * passphrase callback form to another.
29 * that the same passphrase may be asked for more than once, but the
31 * useful for OSSL_DECODER, which may have to use a passphrase while
43 is_expl_passphrase = 1, /* Explicit passphrase given by user */
91 const unsigned char *passphrase,
  /src/external/bsd/libarchive/dist/cpio/
cpio.h 56 const char *passphrase; member in struct:cpio
  /src/external/bsd/wpa/dist/src/ap/
ieee802_11_auth.c 417 char *passphrase; local
425 passphrase = radius_msg_get_tunnel_password(
429 * Passphrase is NULL iff there is no i-th Tunnel-Password
432 if (!passphrase)
445 * passphrase does not contain the NULL termination.
451 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
459 os_memcpy(psk->passphrase, passphrase,
470 os_free(passphrase);
  /src/crypto/external/apache2/openssl/dist/crypto/
passphrase.c 14 #include "internal/passphrase.h"
34 const unsigned char *passphrase,
37 if (!ossl_assert(data != NULL && passphrase != NULL)) {
43 data->_.expl_passphrase.passphrase_copy = passphrase_len != 0 ? OPENSSL_memdup(passphrase, passphrase_len)
  /src/crypto/external/bsd/openssl/dist/crypto/
passphrase.c 14 #include "internal/passphrase.h"
34 const unsigned char *passphrase,
37 if (!ossl_assert(data != NULL && passphrase != NULL)) {
44 passphrase_len != 0 ? OPENSSL_memdup(passphrase, passphrase_len)
  /src/crypto/external/bsd/netpgp/dist/src/lib/
keyring.c 225 char *passphrase; member in struct:__anon990
250 *content->skey_passphrase.passphrase = netpgp_strdup(pass);
257 /* Generally this means a bad passphrase */
258 fprintf(stderr, "Bad passphrase!\n");
304 *content->skey_passphrase.passphrase = netpgp_strdup("");
313 \brief Decrypts secret key from given keydata with given passphrase
315 \param passphrase Passphrase to use to decrypt secret key
325 /* XXX first try with an empty passphrase */
336 /* ask for a passphrase */
    [all...]

Completed in 35 milliseconds

1 2 3 4