/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm.c | 83 * Read a passphrase from the file into the supplied buffer. 86 * Return 0 when no valid passphrase was found in the file. 123 char *passphrase = getpassphrase("Enter passphrase: "); local 124 if (passphrase) { 125 return (strlcpy(buf, passphrase, buf_size));
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | cryptoki.h | 115 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2 119 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, 134 * given passphrase. The caller is responsible to free the allocated 138 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase,
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | pkcs11SUNWExtensions.c | 371 * (e.g. passphrase) using PKCS#5 Password-Based Key Derivation Function 2 377 pkcs11_PasswdToPBKD2Object(CK_SESSION_HANDLE hSession, char *passphrase, argument 390 passphrase == NULL || passphrase_len == 0 || 440 params.pPassword = (CK_UTF8CHAR_PTR)passphrase; 502 * secret key object from a passphrase, an app may call pkcs11_ObjectToKey 558 * given passphrase. The caller is responsible to free the allocated 562 pkcs11_PasswdToKey(CK_SESSION_HANDLE hSession, char *passphrase, argument 569 rv = pkcs11_PasswdToPBKD2Object(hSession, passphrase, passphrase_len,
|
/illumos-gate/usr/src/lib/print/libpapi-ipp/common/ |
H A D | ipp-support.c | 422 char *user, *passphrase; local 442 /* if the passphrase is not set, use the Authentication Callback */ 446 passphrase = svc->password; 448 /* if there is still no passphrase, we have to fail */ 449 if ((passphrase == NULL) || (passphrase[0] == '\0')) 456 snprintf(plain, sizeof (plain), "%s:%s", user, passphrase); 475 passphrase);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa_enc.c | 205 pbkdf2_sha1(char *passphrase, char *ssid, size_t ssid_len, int iterations, argument 208 (void) PKCS5_PBKDF2_HMAC_SHA1(passphrase, -1, (unsigned char *)ssid,
|
H A D | wpa_impl.h | 246 char *passphrase; member in struct:wpa_ssid
|
H A D | wpa_supplicant.c | 706 ssid->passphrase = strdup((const char *)psk); 708 if (ssid->passphrase) { 709 pbkdf2_sha1(ssid->passphrase, (char *)ssid->ssid, 711 wpa_hexdump(MSG_MSGDUMP, "PSK (from passphrase)", 759 free(ssid->passphrase);
|
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | keystore.c | 60 char *passphrase; member in struct:keystore_t 444 tmpstore->passphrase = NULL; 472 if (keystore->passphrase != NULL) 473 free(keystore->passphrase); 1687 if (sunw_PKCS12_contents(p12, keystore->passphrase, 1745 keystore->passphrase) == B_FALSE) { 1759 if (sunw_PKCS12_contents(p12, keystore->passphrase, 1796 keystore->passphrase) == B_FALSE) { 1805 if (sunw_PKCS12_contents(p12, keystore->passphrase, 1841 * keystore password is set in keystore->passphrase [all...] |
H A D | pkgweb.c | 164 * passphrase callback routine. 178 * Description: Specifies the passphrase retrieval method 180 * passphrase callback routine. 3105 * a passphrase is needed. This routine collects 3106 * a passphrase from the user using the given 3107 * passphrase retrieval method set with 3113 * Arguments: buf - Buffer to copy passphrase into 3115 * rw - Whether this passphrase is needed 3119 * a passphrase for writing something. 3124 * Returns: Length of passphrase collecte 3136 char *passphrase; local [all...] |
/illumos-gate/usr/src/cmd/print/bsd-sysv-commands/ |
H A D | common.c | 591 char *user, *svc_name, *passphrase; local 609 gettext("passphrase for %s to access %s: "), user, svc_name); 611 /* ask for the passphrase */ 612 if ((passphrase = getpassphrase(prompt)) != NULL) 613 papiServiceSetPassword(svc, passphrase);
|
/illumos-gate/usr/src/cmd/tsol/misc/ |
H A D | txzonemgr.sh | 343 pass1=$(zenity --entry --title="$title" --text="Enter passphrase:" \ 345 pass2=$(zenity --entry --title="$title" --text="Re-enter passphrase:" \ 389 keysource="passphrase,file://$file" 409 zfs set keysource=passphrase,prompt $ZDSET
|