Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 75) sorted by relevance

123

/dragonfly/contrib/libarchive/libarchive/
H A Darchive_read_add_passphrase.c77 p->passphrase = strdup(passphrase); in new_read_passphrase()
78 if (p->passphrase == NULL) { in new_read_passphrase()
96 if (passphrase == NULL || passphrase[0] == '\0') { in archive_read_add_passphrase()
102 p = new_read_passphrase(a, passphrase); in archive_read_add_passphrase()
142 const char *passphrase; in __archive_read_next_passphrase() local
172 passphrase = p->passphrase; in __archive_read_next_passphrase()
177 passphrase = a->passphrases.callback(&a->archive, in __archive_read_next_passphrase()
179 if (passphrase != NULL) { in __archive_read_next_passphrase()
180 p = new_read_passphrase(a, passphrase); in __archive_read_next_passphrase()
187 passphrase = NULL; in __archive_read_next_passphrase()
[all …]
H A Darchive_write_set_passphrase.c47 free(a->passphrase); in archive_write_set_passphrase()
48 a->passphrase = strdup(p); in archive_write_set_passphrase()
49 if (a->passphrase == NULL) { in archive_write_set_passphrase()
77 if (a->passphrase != NULL) in __archive_write_get_passphrase()
78 return (a->passphrase); in __archive_write_get_passphrase()
85 a->passphrase = strdup(p); in __archive_write_get_passphrase()
86 if (a->passphrase == NULL) { in __archive_write_get_passphrase()
91 return (a->passphrase); in __archive_write_get_passphrase()
H A Darchive_write.c458 if (a->passphrase != NULL) { in archive_write_client_free()
459 memset(a->passphrase, 0, strlen(a->passphrase)); in archive_write_client_free()
460 free(a->passphrase); in archive_write_client_free()
461 a->passphrase = NULL; in archive_write_client_free()
685 if (a->passphrase != NULL) { in _archive_write_free()
687 memset(a->passphrase, 0, strlen(a->passphrase)); in _archive_write_free()
688 free(a->passphrase); in _archive_write_free()
H A Darchive_write_set_format_zip.c1577 const char *passphrase; in init_traditional_pkware_encryption() local
1582 passphrase = __archive_write_get_passphrase(a); in init_traditional_pkware_encryption()
1583 if (passphrase == NULL) { in init_traditional_pkware_encryption()
1593 trad_enc_init(&zip->tctx, passphrase, strlen(passphrase)); in init_traditional_pkware_encryption()
1612 const char *passphrase; in init_winzip_aes_encryption() local
1618 passphrase = __archive_write_get_passphrase(a); in init_winzip_aes_encryption()
1619 if (passphrase == NULL) { in init_winzip_aes_encryption()
1637 archive_pbkdf2_sha1(passphrase, strlen(passphrase), in init_winzip_aes_encryption()
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
H A Dwps_supplicant.c315 if (new_ssid->passphrase && ssid->passphrase && in wpas_wps_remove_dup_network()
316 os_strcmp(new_ssid->passphrase, ssid->passphrase) != in wpas_wps_remove_dup_network()
331 if ((new_ssid->passphrase && !ssid->passphrase) || in wpas_wps_remove_dup_network()
332 (!new_ssid->passphrase && ssid->passphrase)) { in wpas_wps_remove_dup_network()
555 os_free(ssid->passphrase); in wpa_supplicant_wps_cred()
556 ssid->passphrase = os_malloc(cred->key_len + 1); in wpa_supplicant_wps_cred()
557 if (ssid->passphrase == NULL) in wpa_supplicant_wps_cred()
559 os_memcpy(ssid->passphrase, cred->key, cred->key_len); in wpa_supplicant_wps_cred()
560 ssid->passphrase[cred->key_len] = '\0'; in wpa_supplicant_wps_cred()
2023 if (ssid->passphrase) { in wpas_wps_network_to_cred()
[all …]
H A Dp2p_supplicant.c1113 if (ssid->passphrase && !s->passphrase) in wpas_p2p_store_persistent_group()
1115 else if (ssid->passphrase && s->passphrase && in wpas_p2p_store_persistent_group()
1116 os_strcmp(ssid->passphrase, s->passphrase) != 0) in wpas_p2p_store_persistent_group()
1152 s->passphrase = os_strdup(ssid->passphrase); in wpas_p2p_store_persistent_group()
1281 if (passphrase && passphrase[0] == '\0') in wpas_p2p_group_started()
1295 passphrase ? passphrase : "", in wpas_p2p_group_started()
1945 ssid->passphrase = os_strdup(params->passphrase); in wpas_start_wps_go()
2294 os_memcpy(res->passphrase, ssid->passphrase, len); in wpas_go_neg_completed()
6409 ssid->passphrase = os_strdup(params->passphrase); in wpas_start_p2p_client()
6516 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) { in wpas_p2p_group_add_persistent()
[all …]
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/dragonfly/contrib/cryptsetup/tests/
H A Dapi-test.c71 r = write(fd, passphrase, strlen(passphrase)); in _prepare_keyfile()
76 return r == strlen(passphrase) ? 0 : 1; in _prepare_keyfile()
544 char *passphrase = "blabla"; in AddDevicePlain() local
568 …OK_(crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0)… in AddDevicePlain()
589 OK_(crypt_volume_key_get(cd, CRYPT_ANY_SLOT, key2, &key_size, passphrase, strlen(passphrase))); in AddDevicePlain()
675 char *passphrase = "blabla"; in AddDeviceLuks() local
693 EQ_(7, crypt_keyslot_add_by_volume_key(cd, 7, key, key_size, passphrase, strlen(passphrase))); in AddDeviceLuks()
695 …EQ_(7, crypt_activate_by_passphrase(cd, CDEVICE_2, CRYPT_ANY_SLOT, passphrase, strlen(passphrase),… in AddDeviceLuks()
699 …FAIL_(crypt_keyslot_add_by_volume_key(cd, 7, key, key_size, passphrase, strlen(passphrase)), "slot… in AddDeviceLuks()
703 EQ_(6, crypt_keyslot_add_by_volume_key(cd, 6, key, key_size, passphrase, strlen(passphrase))); in AddDeviceLuks()
[all …]
/dragonfly/crypto/openssh/
H A Dauthfile.c69 const char *passphrase, const char *comment, in sshkey_save_private() argument
77 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private()
118 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument
135 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type()
144 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument
147 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private()
152 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument
162 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd()
319 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument
343 passphrase, &key, NULL)) != 0 || in sshkey_load_private_cert()
H A Dssh-keygen.c1536 freezero(passphrase, strlen(passphrase)); in do_change_comment()
1546 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment()
1561 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment()
1569 free(passphrase); in do_change_comment()
1580 freezero(passphrase, strlen(passphrase)); in do_change_comment()
1585 freezero(passphrase, strlen(passphrase)); in do_change_comment()
3849 freezero(passphrase, strlen(passphrase)); in main()
3858 freezero(passphrase, strlen(passphrase)); in main()
3859 passphrase = NULL; in main()
3893 freezero(passphrase, strlen(passphrase)); in main()
[all …]
H A Dsshkey.c3950 if (passphrase == NULL || !strlen(passphrase)) { in sshkey_private_to_blob2()
3976 if (bcrypt_pbkdf(passphrase, strlen(passphrase), in sshkey_private_to_blob2()
4191 if ((passphrase == NULL || strlen(passphrase) == 0) && in private2_decrypt()
4217 if (bcrypt_pbkdf(passphrase, strlen(passphrase), salt, slen, in private2_decrypt()
4428 cipher, passphrase, len, NULL, NULL); in sshkey_private_to_blob_pem_pkcs8()
4461 passphrase, len, NULL, NULL)) == 0) { in sshkey_private_to_blob_pem_pkcs8()
4521 format, passphrase, comment); in sshkey_private_to_fileblob()
4625 (char *)passphrase)) == NULL) { in sshkey_parse_private_pem_fileblob()
4632 if (passphrase != NULL && *passphrase != '\0') in sshkey_parse_private_pem_fileblob()
4731 passphrase, keyp); in sshkey_parse_private_fileblob_type()
[all …]
H A Dsshkey.h267 const char *passphrase, const char *comment,
270 const char *passphrase, struct sshkey **keyp, char **commentp);
272 const char *passphrase, struct sshkey **keyp, char **commentp);
H A Dauthfile.h45 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
/dragonfly/contrib/cryptsetup/lib/
H A Dlibcryptsetup.h202 const char *passphrase,
244 const char *passphrase,
286 const char *passphrase,
322 const char *passphrase,
387 const char *passphrase,
538 const char *passphrase; member
H A Dsetup.c814 CRYPT_ANY_SLOT, options->passphrase, in crypt_luksOpen()
815 options->passphrase ? strlen(options->passphrase) : 0, in crypt_luksOpen()
1312 const char *passphrase, in crypt_resume_by_passphrase() argument
1336 if (passphrase) { in crypt_resume_by_passphrase()
1446 } else if (passphrase) { in crypt_keyslot_add_by_passphrase()
1569 const char *passphrase, in crypt_keyslot_add_by_volume_key() argument
1601 if (!passphrase) { in crypt_keyslot_add_by_volume_key()
1604 passphrase = new_password; in crypt_keyslot_add_by_volume_key()
1646 const char *passphrase, in crypt_activate_by_passphrase() argument
1683 if (passphrase) { in crypt_activate_by_passphrase()
[all …]
H A Dbackends.c17 const char *passphrase, size_t sizep) in hash() argument
40 EVP_DigestUpdate(mdctx, passphrase, sizep); in hash()
H A Dgcrypt.c41 int sizep, const char *passphrase) in gcrypt_hash() argument
56 gcry_md_write(md, passphrase, sizep); in gcrypt_hash()
H A Dinternal.h34 int sizep, const char *passphrase);
65 const char *passphrase, size_t sizep);
/dragonfly/sbin/cryptdisks/
H A Dcryptdisks.c56 char *passphrase; member
256 go->passphrase = buf; in parse_crypt_options()
279 co->passphrase = go->passphrase; in generic_opts_to_luks()
390 (go.passphrase != NULL) ? 0 : 1))) { in entry_parser()
405 if (go.passphrase != NULL) { in entry_parser()
407 go.passphrase))) { in entry_parser()
/dragonfly/contrib/cryptsetup/po/
H A Dcryptsetup.pot53 msgid "Enter any remaining LUKS passphrase: "
77 msgid "Enter LUKS passphrase to be deleted: "
107 msgid "Enter passphrase for %s: "
111 msgid "Enter passphrase: "
124 msgid "Enter LUKS passphrase: "
185 msgid "Enter any passphrase: "
189 msgid "Enter new passphrase for key slot: "
235 msgid "Error reading passphrase from terminal.\n"
239 msgid "Verify passphrase: "
263 msgid "Out of memory while reading passphrase.\n"
[all …]
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dieee802_11_auth.c445 char *passphrase; in decode_tunnel_passwords() local
453 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
460 if (passphrase == NULL) in decode_tunnel_passwords()
479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
487 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
498 os_free(passphrase); in decode_tunnel_passwords()
/dragonfly/contrib/pam_passwdqc/
H A DREADME42 classes that do not meet the requirements for a passphrase.
45 requirement, a passphrase must also consist of a sufficient number of
46 words (see the "passphrase" option below).
74 passphrase=N [passphrase=3]
76 The number of words required for a passphrase, or 0 to disable the
134 disable this feature. Any passphrase that contains the offered
/dragonfly/contrib/libarchive/cpio/
H A Dcpio.c315 cpio->passphrase = cpio->argument; in main()
602 if (cpio->passphrase != NULL) in mode_out()
604 cpio->passphrase); in mode_out()
982 if (cpio->passphrase != NULL) in mode_in()
983 r = archive_read_add_passphrase(a, cpio->passphrase); in mode_in()
1094 if (cpio->passphrase != NULL) in mode_list()
1095 r = archive_read_add_passphrase(a, cpio->passphrase); in mode_list()
/dragonfly/contrib/cryptsetup/
H A DChangeLog5 * Fix luksFormat/luksOpen reading passphrase from stdin and "-" keyfile.
26 * Fix luksOpen reading of passphrase on stdin (if "-" keyfile specified).
40 * Do not verify unlocking passphrase in luksAddKey command.
87 * Fail passphrase read if piped input no longer exists.
103 * Add luksSuspend (freeze device and wipe key) and luksResume (with provided passphrase).
127 * Allow using passphrase provided in options struct for LuksOpen.
407 printing the no-error msg (Command successful). Verify passphrase
409 (main): Add no-verify-passphrase
531 phdr is written after passphrase reading, so the user can change

123