Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 213) sorted by relevance

123456789

/freebsd/contrib/libarchive/libarchive/
H A Darchive_read_add_passphrase.c66 new_read_passphrase(struct archive_read *a, const char *passphrase)
76 p->passphrase = strdup(passphrase); in new_read_passphrase()
77 if (p->passphrase == NULL) { in new_read_passphrase()
87 archive_read_add_passphrase(struct archive *_a, const char *passphrase)
95 if (passphrase == NULL || passphrase[0] == '\0') { in archive_read_add_passphrase()
97 "Empty passphrase is unacceptable"); in archive_read_add_passphrase()
101 p = new_read_passphrase(a, passphrase); in archive_read_add_passphrase()
124 * Call this in advance when you start to get a passphrase fo
67 new_read_passphrase(struct archive_read * a,const char * passphrase) new_read_passphrase() argument
88 archive_read_add_passphrase(struct archive * _a,const char * passphrase) archive_read_add_passphrase() argument
142 const char *passphrase; __archive_read_next_passphrase() local
[all...]
H A Darchive_write_set_passphrase.c38 "Empty passphrase is unacceptable"); in archive_write_set_passphrase()
41 free(a->passphrase); in archive_write_set_passphrase()
42 a->passphrase = strdup(p); in archive_write_set_passphrase()
43 if (a->passphrase == NULL) { in archive_write_set_passphrase()
45 "Can't allocate data for passphrase"); in archive_write_set_passphrase()
83 if (a->passphrase != NULL) in __archive_write_get_passphrase()
84 return (a->passphrase); in __archive_write_get_passphrase()
94 return (a->passphrase); in __archive_write_get_passphrase()
/freebsd/crypto/openssl/demos/encode/
H A Dec_encode.c29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument
63 if (passphrase != NULL) { in load_key()
65 (const unsigned char *)passphrase, in load_key()
66 strlen(passphrase)) == 0) { in load_key()
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument
121 selection = (passphrase != NULL) in store_key()
143 if (passphrase != NULL) { in store_key()
155 (const unsigned char *)passphrase, in store_key()
156 strlen(passphrase)) == 0) { in store_key()
H A Drsa_encode.c29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument
63 if (passphrase != NULL) { in load_key()
65 (const unsigned char *)passphrase, in load_key()
66 strlen(passphrase)) == 0) { in load_key()
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument
121 selection = (passphrase != NULL) in store_key()
143 if (passphrase != NULL) { in store_key()
152 (const unsigned char *)passphrase, in store_key()
153 strlen(passphrase)) == 0) { in store_key()
/freebsd/contrib/wpa/wpa_supplicant/
H A Dwpa_passphrase.c21 char *ssid, *passphrase, buf[64], *pos; in main() local
34 passphrase = argv[2]; in main()
67 passphrase = buf; in main()
70 len = os_strlen(passphrase); in main()
75 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
80 if (pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32) in main()
88 printf("\t#psk=\"%s\"\n", passphrase); in main()
/freebsd/contrib/wpa/hostapd/
H A Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
/freebsd/crypto/openssh/contrib/
H A Dgnome-ssh-askpass2.c153 char *passphrase, *local; in passphrase_dialog() local
274 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog()
276 local = g_locale_from_utf8(passphrase, in passphrase_dialog()
277 strlen(passphrase), NULL, NULL, NULL); in passphrase_dialog()
283 puts(passphrase); in passphrase_dialog()
287 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog()
288 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
289 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
290 g_free(passphrase); in passphrase_dialog()
H A Dgnome-ssh-askpass3.c137 char *passphrase, *local; in passphrase_dialog() local
243 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog()
245 local = g_locale_from_utf8(passphrase, in passphrase_dialog()
246 strlen(passphrase), NULL, NULL, NULL); in passphrase_dialog()
252 puts(passphrase); in passphrase_dialog()
256 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog()
257 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
258 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
259 g_free(passphrase); in passphrase_dialog()
H A Dgnome-ssh-askpass1.c70 char *passphrase; in passphrase_dialog() local
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog()
131 puts(passphrase); in passphrase_dialog()
134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
/freebsd/sys/geom/eli/
H A Dpkcs5v2.c52 size_t saltsize, const char *passphrase, u_int iterations) in pkcs5v2_genkey() argument
55 pkcs5v2_genkey_raw(key, keylen, salt, saltsize, passphrase, in pkcs5v2_genkey()
56 strlen(passphrase), iterations); in pkcs5v2_genkey()
61 size_t saltsize, const uint8_t *passphrase, size_t passlen, in pkcs5v2_genkey_raw() argument
80 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen); in pkcs5v2_genkey_raw()
106 const char passphrase[] = "passphrase"; in pkcs5v2_probe() local
111 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase, in pkcs5v2_probe()
/freebsd/contrib/wpa/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_mixed_raw.ksh62 typeset passphrase="password"
64 log_must eval "echo $passphrase | zfs create -o encryption=on" \
76 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2"
79 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3"
100 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2"
106 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3"
H A Dsend_encrypted_incremental.ksh57 typeset passphrase="password"
67 log_must eval "echo $passphrase > /pool_lb/pwd"
70 log_must zfs create -o encryption=on -o keyformat=passphrase \
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_create/
H A Dzfs_create_encrypted.ksh84 log_mustnot zfs create -o keyformat=passphrase $TESTPOOL/$TESTFS1/c1
86 log_mustnot zfs create -o keyformat=passphrase -o keylocation=prompt \
92 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
94 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
121 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
123 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
/freebsd/crypto/openssh/
H A Dauthfile.c69 const char *passphrase, const char *comment, in sshkey_save_private() argument
77 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private()
118 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument
135 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type()
144 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument
147 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private()
152 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument
162 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd()
321 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument
345 passphrase, &key, NULL)) != 0 || in sshkey_load_private_cert()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_raw.ksh57 typeset passphrase="password"
60 log_must eval "echo $passphrase | zfs create -o encryption=on" \
75 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS2"
87 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/c1"
H A Dzfs_receive_raw_-d.ksh49 typeset passphrase="password1"
53 log_must eval "echo $passphrase | zfs create -o encryption=on" \
60 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/child"
H A Dzfs_receive_to_encrypted.ksh58 typeset passphrase="password"
66 log_must eval "echo $passphrase | zfs create -o encryption=on" \
106 log_must eval "echo $passphrase > $key_location"
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/
H A Dzpool_create_encrypted.ksh69 log_mustnot zpool create -O keyformat=passphrase $TESTPOOL $DISKS
70 log_mustnot zpool create -O keyformat=passphrase -O keylocation=prompt \
78 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
80 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_load-key/
H A Dzfs_load-key_https.ksh50 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
53 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
56 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \
59 log_must zfs create -o encryption=on -o keyformat=passphrase \
H A Dzfs_load-key_all.ksh50 log_must zfs create -o encryption=on -o keyformat=passphrase \
53 log_must zfs create -o encryption=on -o keyformat=passphrase \
56 log_must zfs create -V 64M -o encryption=on -o keyformat=passphrase \
61 log_must zpool create -O encryption=on -O keyformat=passphrase \
/freebsd/crypto/openssh/contrib/cygwin/
H A Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/
H A Dzpool_split_encryption.ksh43 passphrase="password"
49 log_must eval "echo "$passphrase" | zpool create -O encryption=aes-256-ccm " \
53 log_must eval "echo "$passphrase" | zpool split -l -R $altroot " \
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_status/
H A Dzpool_status_005_pos.ksh57 typeset passphrase="password"
63 log_must eval "echo $passphrase > /$TESTPOOL2/pwd"
65 log_must zfs create -o encryption=aes-256-ccm -o keyformat=passphrase \

123456789