/dragonfly/contrib/libarchive/libarchive/ |
H A D | archive_read_add_passphrase.c | 77 p->passphrase = strdup(passphrase); in new_read_passphrase() 78 if (p->passphrase == NULL) { in new_read_passphrase() 96 if (passphrase == NULL || passphrase[0] == '\0') { in archive_read_add_passphrase() 102 p = new_read_passphrase(a, passphrase); in archive_read_add_passphrase() 142 const char *passphrase; in __archive_read_next_passphrase() local 172 passphrase = p->passphrase; in __archive_read_next_passphrase() 177 passphrase = a->passphrases.callback(&a->archive, in __archive_read_next_passphrase() 179 if (passphrase != NULL) { in __archive_read_next_passphrase() 180 p = new_read_passphrase(a, passphrase); in __archive_read_next_passphrase() 187 passphrase = NULL; in __archive_read_next_passphrase() [all …]
|
H A D | archive_write_set_passphrase.c | 47 free(a->passphrase); in archive_write_set_passphrase() 48 a->passphrase = strdup(p); in archive_write_set_passphrase() 49 if (a->passphrase == NULL) { in archive_write_set_passphrase() 77 if (a->passphrase != NULL) in __archive_write_get_passphrase() 78 return (a->passphrase); in __archive_write_get_passphrase() 85 a->passphrase = strdup(p); in __archive_write_get_passphrase() 86 if (a->passphrase == NULL) { in __archive_write_get_passphrase() 91 return (a->passphrase); in __archive_write_get_passphrase()
|
H A D | archive_write.c | 458 if (a->passphrase != NULL) { in archive_write_client_free() 459 memset(a->passphrase, 0, strlen(a->passphrase)); in archive_write_client_free() 460 free(a->passphrase); in archive_write_client_free() 461 a->passphrase = NULL; in archive_write_client_free() 685 if (a->passphrase != NULL) { in _archive_write_free() 687 memset(a->passphrase, 0, strlen(a->passphrase)); in _archive_write_free() 688 free(a->passphrase); in _archive_write_free()
|
H A D | archive_write_set_format_zip.c | 1577 const char *passphrase; in init_traditional_pkware_encryption() local 1582 passphrase = __archive_write_get_passphrase(a); in init_traditional_pkware_encryption() 1583 if (passphrase == NULL) { in init_traditional_pkware_encryption() 1593 trad_enc_init(&zip->tctx, passphrase, strlen(passphrase)); in init_traditional_pkware_encryption() 1612 const char *passphrase; in init_winzip_aes_encryption() local 1618 passphrase = __archive_write_get_passphrase(a); in init_winzip_aes_encryption() 1619 if (passphrase == NULL) { in init_winzip_aes_encryption() 1637 archive_pbkdf2_sha1(passphrase, strlen(passphrase), in init_winzip_aes_encryption()
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
H A D | wps_supplicant.c | 315 if (new_ssid->passphrase && ssid->passphrase && in wpas_wps_remove_dup_network() 316 os_strcmp(new_ssid->passphrase, ssid->passphrase) != in wpas_wps_remove_dup_network() 331 if ((new_ssid->passphrase && !ssid->passphrase) || in wpas_wps_remove_dup_network() 332 (!new_ssid->passphrase && ssid->passphrase)) { in wpas_wps_remove_dup_network() 555 os_free(ssid->passphrase); in wpa_supplicant_wps_cred() 556 ssid->passphrase = os_malloc(cred->key_len + 1); in wpa_supplicant_wps_cred() 557 if (ssid->passphrase == NULL) in wpa_supplicant_wps_cred() 559 os_memcpy(ssid->passphrase, cred->key, cred->key_len); in wpa_supplicant_wps_cred() 560 ssid->passphrase[cred->key_len] = '\0'; in wpa_supplicant_wps_cred() 2023 if (ssid->passphrase) { in wpas_wps_network_to_cred() [all …]
|
H A D | p2p_supplicant.c | 1113 if (ssid->passphrase && !s->passphrase) in wpas_p2p_store_persistent_group() 1115 else if (ssid->passphrase && s->passphrase && in wpas_p2p_store_persistent_group() 1116 os_strcmp(ssid->passphrase, s->passphrase) != 0) in wpas_p2p_store_persistent_group() 1152 s->passphrase = os_strdup(ssid->passphrase); in wpas_p2p_store_persistent_group() 1281 if (passphrase && passphrase[0] == '\0') in wpas_p2p_group_started() 1295 passphrase ? passphrase : "", in wpas_p2p_group_started() 1945 ssid->passphrase = os_strdup(params->passphrase); in wpas_start_wps_go() 2294 os_memcpy(res->passphrase, ssid->passphrase, len); in wpas_go_neg_completed() 6409 ssid->passphrase = os_strdup(params->passphrase); in wpas_start_p2p_client() 6516 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) { in wpas_p2p_group_add_persistent() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/dragonfly/contrib/cryptsetup/tests/ |
H A D | api-test.c | 71 r = write(fd, passphrase, strlen(passphrase)); in _prepare_keyfile() 76 return r == strlen(passphrase) ? 0 : 1; in _prepare_keyfile() 544 char *passphrase = "blabla"; in AddDevicePlain() local 568 …OK_(crypt_activate_by_passphrase(cd, CDEVICE_1, CRYPT_ANY_SLOT, passphrase, strlen(passphrase), 0)… in AddDevicePlain() 589 OK_(crypt_volume_key_get(cd, CRYPT_ANY_SLOT, key2, &key_size, passphrase, strlen(passphrase))); in AddDevicePlain() 675 char *passphrase = "blabla"; in AddDeviceLuks() local 693 EQ_(7, crypt_keyslot_add_by_volume_key(cd, 7, key, key_size, passphrase, strlen(passphrase))); in AddDeviceLuks() 695 …EQ_(7, crypt_activate_by_passphrase(cd, CDEVICE_2, CRYPT_ANY_SLOT, passphrase, strlen(passphrase),… in AddDeviceLuks() 699 …FAIL_(crypt_keyslot_add_by_volume_key(cd, 7, key, key_size, passphrase, strlen(passphrase)), "slot… in AddDeviceLuks() 703 EQ_(6, crypt_keyslot_add_by_volume_key(cd, 6, key, key_size, passphrase, strlen(passphrase))); in AddDeviceLuks() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | authfile.c | 69 const char *passphrase, const char *comment, in sshkey_save_private() argument 77 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private() 118 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument 135 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type() 144 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument 147 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private() 152 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument 162 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd() 319 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument 343 passphrase, &key, NULL)) != 0 || in sshkey_load_private_cert()
|
H A D | ssh-keygen.c | 1536 freezero(passphrase, strlen(passphrase)); in do_change_comment() 1546 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment() 1561 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment() 1569 free(passphrase); in do_change_comment() 1580 freezero(passphrase, strlen(passphrase)); in do_change_comment() 1585 freezero(passphrase, strlen(passphrase)); in do_change_comment() 3849 freezero(passphrase, strlen(passphrase)); in main() 3858 freezero(passphrase, strlen(passphrase)); in main() 3859 passphrase = NULL; in main() 3893 freezero(passphrase, strlen(passphrase)); in main() [all …]
|
H A D | sshkey.c | 3950 if (passphrase == NULL || !strlen(passphrase)) { in sshkey_private_to_blob2() 3976 if (bcrypt_pbkdf(passphrase, strlen(passphrase), in sshkey_private_to_blob2() 4191 if ((passphrase == NULL || strlen(passphrase) == 0) && in private2_decrypt() 4217 if (bcrypt_pbkdf(passphrase, strlen(passphrase), salt, slen, in private2_decrypt() 4428 cipher, passphrase, len, NULL, NULL); in sshkey_private_to_blob_pem_pkcs8() 4461 passphrase, len, NULL, NULL)) == 0) { in sshkey_private_to_blob_pem_pkcs8() 4521 format, passphrase, comment); in sshkey_private_to_fileblob() 4625 (char *)passphrase)) == NULL) { in sshkey_parse_private_pem_fileblob() 4632 if (passphrase != NULL && *passphrase != '\0') in sshkey_parse_private_pem_fileblob() 4731 passphrase, keyp); in sshkey_parse_private_fileblob_type() [all …]
|
H A D | sshkey.h | 267 const char *passphrase, const char *comment, 270 const char *passphrase, struct sshkey **keyp, char **commentp); 272 const char *passphrase, struct sshkey **keyp, char **commentp);
|
H A D | authfile.h | 45 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
|
/dragonfly/contrib/cryptsetup/lib/ |
H A D | libcryptsetup.h | 202 const char *passphrase, 244 const char *passphrase, 286 const char *passphrase, 322 const char *passphrase, 387 const char *passphrase, 538 const char *passphrase; member
|
H A D | setup.c | 814 CRYPT_ANY_SLOT, options->passphrase, in crypt_luksOpen() 815 options->passphrase ? strlen(options->passphrase) : 0, in crypt_luksOpen() 1312 const char *passphrase, in crypt_resume_by_passphrase() argument 1336 if (passphrase) { in crypt_resume_by_passphrase() 1446 } else if (passphrase) { in crypt_keyslot_add_by_passphrase() 1569 const char *passphrase, in crypt_keyslot_add_by_volume_key() argument 1601 if (!passphrase) { in crypt_keyslot_add_by_volume_key() 1604 passphrase = new_password; in crypt_keyslot_add_by_volume_key() 1646 const char *passphrase, in crypt_activate_by_passphrase() argument 1683 if (passphrase) { in crypt_activate_by_passphrase() [all …]
|
H A D | backends.c | 17 const char *passphrase, size_t sizep) in hash() argument 40 EVP_DigestUpdate(mdctx, passphrase, sizep); in hash()
|
H A D | gcrypt.c | 41 int sizep, const char *passphrase) in gcrypt_hash() argument 56 gcry_md_write(md, passphrase, sizep); in gcrypt_hash()
|
H A D | internal.h | 34 int sizep, const char *passphrase); 65 const char *passphrase, size_t sizep);
|
/dragonfly/sbin/cryptdisks/ |
H A D | cryptdisks.c | 56 char *passphrase; member 256 go->passphrase = buf; in parse_crypt_options() 279 co->passphrase = go->passphrase; in generic_opts_to_luks() 390 (go.passphrase != NULL) ? 0 : 1))) { in entry_parser() 405 if (go.passphrase != NULL) { in entry_parser() 407 go.passphrase))) { in entry_parser()
|
/dragonfly/contrib/cryptsetup/po/ |
H A D | cryptsetup.pot | 53 msgid "Enter any remaining LUKS passphrase: " 77 msgid "Enter LUKS passphrase to be deleted: " 107 msgid "Enter passphrase for %s: " 111 msgid "Enter passphrase: " 124 msgid "Enter LUKS passphrase: " 185 msgid "Enter any passphrase: " 189 msgid "Enter new passphrase for key slot: " 235 msgid "Error reading passphrase from terminal.\n" 239 msgid "Verify passphrase: " 263 msgid "Out of memory while reading passphrase.\n" [all …]
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 445 char *passphrase; in decode_tunnel_passwords() local 453 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 460 if (passphrase == NULL) in decode_tunnel_passwords() 479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 487 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 498 os_free(passphrase); in decode_tunnel_passwords()
|
/dragonfly/contrib/pam_passwdqc/ |
H A D | README | 42 classes that do not meet the requirements for a passphrase. 45 requirement, a passphrase must also consist of a sufficient number of 46 words (see the "passphrase" option below). 74 passphrase=N [passphrase=3] 76 The number of words required for a passphrase, or 0 to disable the 134 disable this feature. Any passphrase that contains the offered
|
/dragonfly/contrib/libarchive/cpio/ |
H A D | cpio.c | 315 cpio->passphrase = cpio->argument; in main() 602 if (cpio->passphrase != NULL) in mode_out() 604 cpio->passphrase); in mode_out() 982 if (cpio->passphrase != NULL) in mode_in() 983 r = archive_read_add_passphrase(a, cpio->passphrase); in mode_in() 1094 if (cpio->passphrase != NULL) in mode_list() 1095 r = archive_read_add_passphrase(a, cpio->passphrase); in mode_list()
|
/dragonfly/contrib/cryptsetup/ |
H A D | ChangeLog | 5 * Fix luksFormat/luksOpen reading passphrase from stdin and "-" keyfile. 26 * Fix luksOpen reading of passphrase on stdin (if "-" keyfile specified). 40 * Do not verify unlocking passphrase in luksAddKey command. 87 * Fail passphrase read if piped input no longer exists. 103 * Add luksSuspend (freeze device and wipe key) and luksResume (with provided passphrase). 127 * Allow using passphrase provided in options struct for LuksOpen. 407 printing the no-error msg (Command successful). Verify passphrase 409 (main): Add no-verify-passphrase 531 phdr is written after passphrase reading, so the user can change
|