/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_read_add_passphrase.c | 66 new_read_passphrase(struct archive_read *a, const char *passphrase) 76 p->passphrase = strdup(passphrase); in new_read_passphrase() 77 if (p->passphrase == NULL) { in new_read_passphrase() 87 archive_read_add_passphrase(struct archive *_a, const char *passphrase) 95 if (passphrase == NULL || passphrase[0] == '\0') { in archive_read_add_passphrase() 97 "Empty passphrase is unacceptable"); in archive_read_add_passphrase() 101 p = new_read_passphrase(a, passphrase); in archive_read_add_passphrase() 124 * Call this in advance when you start to get a passphrase fo 67 new_read_passphrase(struct archive_read * a,const char * passphrase) new_read_passphrase() argument 88 archive_read_add_passphrase(struct archive * _a,const char * passphrase) archive_read_add_passphrase() argument 142 const char *passphrase; __archive_read_next_passphrase() local [all...] |
H A D | archive_write_set_passphrase.c | 38 "Empty passphrase is unacceptable"); in archive_write_set_passphrase() 41 free(a->passphrase); in archive_write_set_passphrase() 42 a->passphrase = strdup(p); in archive_write_set_passphrase() 43 if (a->passphrase == NULL) { in archive_write_set_passphrase() 45 "Can't allocate data for passphrase"); in archive_write_set_passphrase() 83 if (a->passphrase != NULL) in __archive_write_get_passphrase() 84 return (a->passphrase); in __archive_write_get_passphrase() 94 return (a->passphrase); in __archive_write_get_passphrase()
|
/freebsd/crypto/openssl/demos/encode/ |
H A D | ec_encode.c | 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument 63 if (passphrase != NULL) { in load_key() 65 (const unsigned char *)passphrase, in load_key() 66 strlen(passphrase)) == 0) { in load_key() 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument 121 selection = (passphrase != NULL) in store_key() 143 if (passphrase != NULL) { in store_key() 155 (const unsigned char *)passphrase, in store_key() 156 strlen(passphrase)) == 0) { in store_key()
|
H A D | rsa_encode.c | 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument 63 if (passphrase != NULL) { in load_key() 65 (const unsigned char *)passphrase, in load_key() 66 strlen(passphrase)) == 0) { in load_key() 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument 121 selection = (passphrase != NULL) in store_key() 143 if (passphrase != NULL) { in store_key() 152 (const unsigned char *)passphrase, in store_key() 153 strlen(passphrase)) == 0) { in store_key()
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpa_passphrase.c | 21 char *ssid, *passphrase, buf[64], *pos; in main() local 34 passphrase = argv[2]; in main() 67 passphrase = buf; in main() 70 len = os_strlen(passphrase); in main() 75 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 80 if (pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32) in main() 88 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/freebsd/contrib/wpa/hostapd/ |
H A D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
/freebsd/crypto/openssh/contrib/ |
H A D | gnome-ssh-askpass2.c | 153 char *passphrase, *local; in passphrase_dialog() local 274 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 276 local = g_locale_from_utf8(passphrase, in passphrase_dialog() 277 strlen(passphrase), NULL, NULL, NULL); in passphrase_dialog() 283 puts(passphrase); in passphrase_dialog() 287 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 288 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 289 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 290 g_free(passphrase); in passphrase_dialog()
|
H A D | gnome-ssh-askpass3.c | 137 char *passphrase, *local; in passphrase_dialog() local 243 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 245 local = g_locale_from_utf8(passphrase, in passphrase_dialog() 246 strlen(passphrase), NULL, NULL, NULL); in passphrase_dialog() 252 puts(passphrase); in passphrase_dialog() 256 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 257 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 258 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 259 g_free(passphrase); in passphrase_dialog()
|
H A D | gnome-ssh-askpass1.c | 70 char *passphrase; in passphrase_dialog() local 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog() 131 puts(passphrase); in passphrase_dialog() 134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
|
/freebsd/sys/geom/eli/ |
H A D | pkcs5v2.c | 52 size_t saltsize, const char *passphrase, u_int iterations) in pkcs5v2_genkey() argument 55 pkcs5v2_genkey_raw(key, keylen, salt, saltsize, passphrase, in pkcs5v2_genkey() 56 strlen(passphrase), iterations); in pkcs5v2_genkey() 61 size_t saltsize, const uint8_t *passphrase, size_t passlen, in pkcs5v2_genkey_raw() argument 80 g_eli_crypto_hmac_init(&startpoint, passphrase, passlen); in pkcs5v2_genkey_raw() 106 const char passphrase[] = "passphrase"; in pkcs5v2_probe() local 111 pkcs5v2_genkey(key, sizeof(key), salt, sizeof(salt), passphrase, in pkcs5v2_probe()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/ |
H A D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para>
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
H A D | send_mixed_raw.ksh | 62 typeset passphrase="password" 64 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 76 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2" 79 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3" 100 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS2" 106 log_must eval "echo $passphrase | zfs load-key $TESTPOOL/$TESTFS3"
|
H A D | send_encrypted_incremental.ksh | 57 typeset passphrase="password" 67 log_must eval "echo $passphrase > /pool_lb/pwd" 70 log_must zfs create -o encryption=on -o keyformat=passphrase \
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_create/ |
H A D | zfs_create_encrypted.ksh | 84 log_mustnot zfs create -o keyformat=passphrase $TESTPOOL/$TESTFS1/c1 86 log_mustnot zfs create -o keyformat=passphrase -o keylocation=prompt \ 92 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \ 94 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \ 121 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \ 123 log_mustnot zfs create -o encryption=off -o keyformat=passphrase \
|
/freebsd/crypto/openssh/ |
H A D | authfile.c | 69 const char *passphrase, const char *comment, in sshkey_save_private() argument 77 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private() 118 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument 135 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type() 144 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument 147 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private() 152 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument 162 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd() 321 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument 345 passphrase, &key, NULL)) != 0 || in sshkey_load_private_cert()
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/ |
H A D | zfs_receive_raw.ksh | 57 typeset passphrase="password" 60 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 75 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS2" 87 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/c1"
|
H A D | zfs_receive_raw_-d.ksh | 49 typeset passphrase="password1" 53 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 60 log_must eval "echo $passphrase | zfs mount -l $TESTPOOL/$TESTFS1/child"
|
H A D | zfs_receive_to_encrypted.ksh | 58 typeset passphrase="password" 66 log_must eval "echo $passphrase | zfs create -o encryption=on" \ 106 log_must eval "echo $passphrase > $key_location"
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/ |
H A D | zpool_create_encrypted.ksh | 69 log_mustnot zpool create -O keyformat=passphrase $TESTPOOL $DISKS 70 log_mustnot zpool create -O keyformat=passphrase -O keylocation=prompt \ 78 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \ 80 log_mustnot zpool create -O encryption=off -O keyformat=passphrase \
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_load-key/ |
H A D | zfs_load-key_https.ksh | 50 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \ 53 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \ 56 log_mustnot zfs create -o encryption=on -o keyformat=passphrase \ 59 log_must zfs create -o encryption=on -o keyformat=passphrase \
|
H A D | zfs_load-key_all.ksh | 50 log_must zfs create -o encryption=on -o keyformat=passphrase \ 53 log_must zfs create -o encryption=on -o keyformat=passphrase \ 56 log_must zfs create -V 64M -o encryption=on -o keyformat=passphrase \ 61 log_must zpool create -O encryption=on -O keyformat=passphrase \
|
/freebsd/crypto/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/ |
H A D | zpool_split_encryption.ksh | 43 passphrase="password" 49 log_must eval "echo "$passphrase" | zpool create -O encryption=aes-256-ccm " \ 53 log_must eval "echo "$passphrase" | zpool split -l -R $altroot " \
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_status/ |
H A D | zpool_status_005_pos.ksh | 57 typeset passphrase="password" 63 log_must eval "echo $passphrase > /$TESTPOOL2/pwd" 65 log_must zfs create -o encryption=aes-256-ccm -o keyformat=passphrase \
|