Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 22 of 22) sorted by relevance

/titanic_50/usr/src/cmd/ssh/libssh/common/
H A Dauthfile.c69 key_save_private_rsa1(Key *key, const char *filename, const char *passphrase, in key_save_private_rsa1() argument
83 cipher_num = (strcmp(passphrase, "") == 0) ? in key_save_private_rsa1()
134 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_save_private_rsa1()
173 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; in key_save_private_pem() local
194 cipher, passphrase, len, NULL, NULL); in key_save_private_pem()
198 cipher, passphrase, len, NULL, NULL); in key_save_private_pem()
206 key_save_private(Key *key, const char *filename, const char *passphrase, in key_save_private() argument
211 return key_save_private_rsa1(key, filename, passphrase, in key_save_private()
216 return key_save_private_pem(key, filename, passphrase, in key_save_private()
313 key_load_private_rsa1(int fd, const char *filename, const char *passphrase, in key_load_private_rsa1() argument
[all …]
H A Dcipher.c282 const char *passphrase, int encrypt) in cipher_set_key_string() argument
288 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); in cipher_set_key_string()
/titanic_50/usr/src/cmd/ssh/ssh-keygen/
H A Dssh-keygen.c816 char new_comment[1024], *comment, *passphrase; in do_change_comment() local
832 passphrase = xstrdup(identity_passphrase); in do_change_comment()
834 passphrase = xstrdup(identity_new_passphrase); in do_change_comment()
836 passphrase = in do_change_comment()
840 private = key_load_private(identity_file, passphrase, &comment); in do_change_comment()
842 memset(passphrase, 0, strlen(passphrase)); in do_change_comment()
843 xfree(passphrase); in do_change_comment()
848 passphrase = xstrdup(""); in do_change_comment()
864 memset(passphrase, 0, strlen(passphrase)); in do_change_comment()
873 if (!key_save_private(private, identity_file, passphrase, new_comment)) { in do_change_comment()
[all …]
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm.c123 char *passphrase = getpassphrase("Enter passphrase: "); in get_passphrase() local
124 if (passphrase) { in get_passphrase()
125 return (strlcpy(buf, passphrase, buf_size)); in get_passphrase()
/titanic_50/usr/src/lib/pkcs11/include/
H A Dcryptoki.h119 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase,
138 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase,
/titanic_50/usr/src/lib/print/libpapi-ipp/common/
H A Dipp-support.c422 char *user, *passphrase; in setAuthString() local
446 passphrase = svc->password; in setAuthString()
449 if ((passphrase == NULL) || (passphrase[0] == '\0')) in setAuthString()
456 snprintf(plain, sizeof (plain), "%s:%s", user, passphrase); in setAuthString()
475 passphrase); in setAuthString()
/titanic_50/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11SUNWExtensions.c377 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, in pkcs11_PasswdToPBKD2Object() argument
390 passphrase == NULL || passphrase_len == 0 || in pkcs11_PasswdToPBKD2Object()
440 params.pPassword = (CK_UTF8CHAR_PTR)passphrase; in pkcs11_PasswdToPBKD2Object()
562 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase, in pkcs11_PasswdToKey() argument
569 rv = pkcs11_PasswdToPBKD2Object(hSession, passphrase, passphrase_len, in pkcs11_PasswdToKey()
/titanic_50/usr/src/lib/libpkg/common/
H A Dkeystore.c60 char *passphrase; member
444 tmpstore->passphrase = NULL; in new_keystore()
472 if (keystore->passphrase != NULL) in free_keystore()
473 free(keystore->passphrase); in free_keystore()
1687 if (sunw_PKCS12_contents(p12, keystore->passphrase, in read_keystore()
1745 keystore->passphrase) == B_FALSE) { in read_keystore()
1759 if (sunw_PKCS12_contents(p12, keystore->passphrase, in read_keystore()
1796 keystore->passphrase) == B_FALSE) { in read_keystore()
1805 if (sunw_PKCS12_contents(p12, keystore->passphrase, in read_keystore()
1879 keystore->passphrase = passwd; in get_keystore_passwd()
[all …]
H A Dpkgweb.c3136 char *passphrase; in pkg_passphrase_cb() local
3149 if ((passphrase = getpassphrase(prompt)) == NULL) { in pkg_passphrase_cb()
3162 (void) strlcpy(passphrase_copy, passphrase, in pkg_passphrase_cb()
3175 if ((passphrase = in pkg_passphrase_cb()
3182 if (!streq(passphrase_copy, passphrase)) { in pkg_passphrase_cb()
3189 passphrase = arg + 5; in pkg_passphrase_cb()
3191 passphrase = getenv(arg + 4); in pkg_passphrase_cb()
3231 if (passphrase == NULL) { in pkg_passphrase_cb()
3238 (void) strlcpy(buf, passphrase, size); in pkg_passphrase_cb()
/titanic_50/usr/src/cmd/ssh/ssh/
H A Dsshconnect1.c217 char buf[300], *passphrase, *comment, *authfile; in try_rsa_authentication() local
270 passphrase = read_passphrase(buf, 0); in try_rsa_authentication()
271 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication()
273 authfile, passphrase, NULL); in try_rsa_authentication()
279 memset(passphrase, 0, strlen(passphrase)); in try_rsa_authentication()
280 xfree(passphrase); in try_rsa_authentication()
H A Dsshconnect2.c1172 char prompt[300], *passphrase; in load_identity_file() local
1187 passphrase = read_passphrase(prompt, 0); in load_identity_file()
1188 if (strcmp(passphrase, "") != 0) { in load_identity_file()
1190 passphrase, NULL); in load_identity_file()
1196 memset(passphrase, 0, strlen(passphrase)); in load_identity_file()
1197 xfree(passphrase); in load_identity_file()
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa_enc.c205 pbkdf2_sha1(char *passphrase, char *ssid, size_t ssid_len, int iterations, in pbkdf2_sha1() argument
208 (void) PKCS5_PBKDF2_HMAC_SHA1(passphrase, -1, (unsigned char *)ssid, in pbkdf2_sha1()
H A Dwpa_supplicant.c706 ssid->passphrase = strdup((const char *)psk); in wpa_config_read_network()
708 if (ssid->passphrase) { in wpa_config_read_network()
709 pbkdf2_sha1(ssid->passphrase, (char *)ssid->ssid, in wpa_config_read_network()
759 free(ssid->passphrase); in wpa_config_free()
H A Dwpa_impl.h246 char *passphrase; member
H A DREADME456 psk="very secret passphrase"
543 psk="very secret passphrase"
567 included in configuration. If the private key uses a passphrase, this
/titanic_50/usr/src/cmd/print/bsd-sysv-commands/
H A Dcommon.c591 char *user, *svc_name, *passphrase; in cli_auth_callback() local
612 if ((passphrase = getpassphrase(prompt)) != NULL) in cli_auth_callback()
613 papiServiceSetPassword(svc, passphrase); in cli_auth_callback()
/titanic_50/usr/src/cmd/ssh/doc/
H A DINSTALL20 If you wish to build the GNOME passphrase requester, you will need the GNOME
27 passphrase requester. This is maintained separately at:
96 --enable-gnome-askpass will build the GNOME passphrase dialog. You
H A DREADME.Ylonen366 If you need to type a password/passphrase for the remote machine,
402 The RSA private key can be protected with a passphrase. The
403 passphrase can be any string; it is hashed with MD5 to produce an
405 the key file. With passphrase, authorization requires access to the key
406 file and the passphrase. Without passphrase, authorization only
H A DOVERVIEW51 encrypted with a passphrase. The functions to read passphrases
H A DChangeLog104 supplied passphrase. Problem report from Lutz Jaenicke
284 - (djm) Fix 9 character passphrase failure with gnome-ssh-askpass.
1240 - check whether file exists before asking for passphrase
2371 - [ssh-add.c] change passphrase loop logic and remove ref to
2491 - Added GNOME passphrase requestor (use --with-gnome-askpass)
/titanic_50/usr/src/lib/libcryptoutil/
H A DREADME205 also reads the PIN if the PKCS#11 URI specifies a passphrase dialog. The
/titanic_50/usr/src/cmd/tsol/misc/
H A Dtxzonemgr.sh409 zfs set keysource=passphrase,prompt $ZDSET