Searched refs:passphrase (Results 1 - 11 of 11) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm.c83 * Read a passphrase from the file into the supplied buffer.
86 * Return 0 when no valid passphrase was found in the file.
123 char *passphrase = getpassphrase("Enter passphrase: "); local
124 if (passphrase) {
125 return (strlcpy(buf, passphrase, buf_size));
/illumos-gate/usr/src/lib/pkcs11/include/
H A Dcryptoki.h115 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2
119 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase,
134 * given passphrase. The caller is responsible to free the allocated
138 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase,
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A Dpkcs11SUNWExtensions.c371 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2
377 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, argument
390 passphrase == NULL || passphrase_len == 0 ||
440 params.pPassword = (CK_UTF8CHAR_PTR)passphrase;
502 * secret key object from a passphrase, an app may call pkcs11_ObjectToKey
558 * given passphrase. The caller is responsible to free the allocated
562 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase, argument
569 rv = pkcs11_PasswdToPBKD2Object(hSession, passphrase, passphrase_len,
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/
H A Dipp-support.c422 char *user, *passphrase; local
442 /* if the passphrase is not set, use the Authentication Callback */
446 passphrase = svc->password;
448 /* if there is still no passphrase, we have to fail */
449 if ((passphrase == NULL) || (passphrase[0] == '\0'))
456 snprintf(plain, sizeof (plain), "%s:%s", user, passphrase);
475 passphrase);
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Dwpa_enc.c205 pbkdf2_sha1(char *passphrase, char *ssid, size_t ssid_len, int iterations, argument
208 (void) PKCS5_PBKDF2_HMAC_SHA1(passphrase, -1, (unsigned char *)ssid,
H A Dwpa_impl.h246 char *passphrase; member in struct:wpa_ssid
H A Dwpa_supplicant.c706 ssid->passphrase = strdup((const char *)psk);
708 if (ssid->passphrase) {
709 pbkdf2_sha1(ssid->passphrase, (char *)ssid->ssid,
711 wpa_hexdump(MSG_MSGDUMP, "PSK (from passphrase)",
759 free(ssid->passphrase);
/illumos-gate/usr/src/lib/libpkg/common/
H A Dkeystore.c60 char *passphrase; member in struct:keystore_t
444 tmpstore->passphrase = NULL;
472 if (keystore->passphrase != NULL)
473 free(keystore->passphrase);
1687 if (sunw_PKCS12_contents(p12, keystore->passphrase,
1745 keystore->passphrase) == B_FALSE) {
1759 if (sunw_PKCS12_contents(p12, keystore->passphrase,
1796 keystore->passphrase) == B_FALSE) {
1805 if (sunw_PKCS12_contents(p12, keystore->passphrase,
1841 * keystore password is set in keystore->passphrase
[all...]
H A Dpkgweb.c164 * passphrase callback routine.
178 * Description: Specifies the passphrase retrieval method
180 * passphrase callback routine.
3105 * a passphrase is needed. This routine collects
3106 * a passphrase from the user using the given
3107 * passphrase retrieval method set with
3113 * Arguments: buf - Buffer to copy passphrase into
3115 * rw - Whether this passphrase is needed
3119 * a passphrase for writing something.
3124 * Returns: Length of passphrase collecte
3136 char *passphrase; local
[all...]
/illumos-gate/usr/src/cmd/print/bsd-sysv-commands/
H A Dcommon.c591 char *user, *svc_name, *passphrase; local
609 gettext("passphrase for %s to access %s: "), user, svc_name);
611 /* ask for the passphrase */
612 if ((passphrase = getpassphrase(prompt)) != NULL)
613 papiServiceSetPassword(svc, passphrase);
/illumos-gate/usr/src/cmd/tsol/misc/
H A Dtxzonemgr.sh343 pass1=$(zenity --entry --title="$title" --text="Enter passphrase:" \
345 pass2=$(zenity --entry --title="$title" --text="Re-enter passphrase:" \
389 keysource="passphrase,file://$file"
409 zfs set keysource=passphrase,prompt $ZDSET

Completed in 4348 milliseconds