Searched refs:passphrase (Results 1 - 25 of 107) sorted by relevance

12345

/external/dropbear/
H A Dkeyimport.h37 int import_write(const char *filename, sign_key *key, char *passphrase,
39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
H A Dkeyimport.c53 static sign_key *openssh_read(const char *filename, char *passphrase);
55 char *passphrase);
62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase);
64 char *passphrase);
79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { argument
82 return openssh_read(filename, passphrase);
87 return sshcom_read(filename, passphrase);
93 int import_write(const char *filename, sign_key *key, char *passphrase, argument
97 return openssh_write(filename, key, passphrase);
102 return sshcom_write(filename, key, passphrase);
509 openssh_read(const char *filename, char *passphrase) argument
693 openssh_write(const char *filename, sign_key *key, char *passphrase) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6
[all...]
/external/chromium_org/crypto/
H A Dopenpgp_symmetric_encryption.h35 base::StringPiece passphrase,
39 base::StringPiece passphrase);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dsha1.h25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
/external/openssh/contrib/
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase
[all...]
/external/chromium_org/chrome/browser/sync/test/integration/
H A Dpasswords_helper.h41 // Sets the cryptographer's encryption passphrase for the profile at index
42 // |index| to |passphrase|, and passphrase type |type|.
44 const std::string& passphrase,
47 // Sets the cryptographer's decryption passphrase for the profile at index
48 // |index| to |passphrase|. Returns false if the operation failed, and true
50 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
/external/chromium_org/sync/internal_api/public/
H A Dsync_encryption_handler.h22 // Reasons due to which Cryptographer might require a passphrase.
26 // passphrase for its first attempt at
30 // passphrase for its first attempt at
34 // The different states for the encryption passphrase. These control if and how
35 // the user should be prompted for a decryption passphrase.
37 IMPLICIT_PASSPHRASE = 0, // GAIA-based passphrase (deprecated).
38 KEYSTORE_PASSPHRASE = 1, // Keystore passphrase.
39 FROZEN_IMPLICIT_PASSPHRASE = 2, // Frozen GAIA passphrase.
40 CUSTOM_PASSPHRASE = 3, // User-provided passphrase.
62 // Called when user interaction is required to obtain a valid passphrase
[all...]
/external/chromium_org/sync/test/
H A Dfake_sync_encryption_handler.h35 virtual void SetEncryptionPassphrase(const std::string& passphrase,
37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
H A Dfake_sync_encryption_handler.cc100 const std::string& passphrase,
107 const std::string& passphrase) {
99 SetEncryptionPassphrase( const std::string& passphrase, bool is_explicit) argument
106 SetDecryptionPassphrase( const std::string& passphrase) argument
/external/openssh/contrib/cygwin/
H A Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
/external/openssh/
H A Dauthfile.c7 * for reading the passphrase from the user.
80 * passphrase. The identification of the blob (lowest 64 bits of n) will
82 * passphrase.
85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, argument
96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
99 cipher_num = (strcmp(passphrase, "") == 0) ?
107 /* Put checkbytes for checking passphrase validity. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
184 error("passphrase to
241 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument
258 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument
418 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument
519 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument
596 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument
641 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument
660 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument
698 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument
721 key_load_private(const char *filename, const char *passphrase, char **commentp) argument
845 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument
[all...]
/external/chromium/chrome/browser/ui/webui/options/
H A Dsync_setup_handler.cc127 !result->GetString("passphrase", &config->secondary_passphrase))
133 bool GetPassphrase(const std::string& json, std::string* passphrase) { argument
139 return result->GetString("passphrase", passphrase);
144 std::string* passphrase) {
151 result->GetString("passphrase", passphrase);
321 StringValue page("passphrase");
422 std::string passphrase;
423 if (!GetPassphrase(json, &passphrase)) {
142 GetFirstPassphrase(const std::string& json, std::string* option, std::string* passphrase) argument
448 std::string passphrase; local
[all...]
/external/bison/build-aux/
H A Dgnupload224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" |
[all...]
/external/chromium_org/sync/internal_api/
H A Dsync_encryption_handler_impl.h60 virtual void SetEncryptionPassphrase(const std::string& passphrase,
62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
157 // explicit passphrase state (if the cryptographer is ready).
175 // Sets a new custom passphrase. Should only be called if a custom passphrase
178 // passphrase already existed.
179 void SetCustomPassphrase(const std::string& passphrase,
182 // Decrypt the encryption keybag using a user provided passphrase.
183 // Should only be called if the current passphrase is a frozen implicit
184 // passphrase o
[all...]
/external/chromium_org/chromeos/network/onc/
H A Donc_utils.h45 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an
48 const std::string& passphrase,
93 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs|
101 const std::string& passphrase,
/external/chromium/chrome/browser/resources/options/
H A Dsync_setup_overlay.css19 #sync-passphrase-container {
23 #sync-custom-passphrase {
27 #sync-passphrase-message {
31 .sync-custom-passphrase-input {
115 #passphrase-encryption-message {
120 #passphrase-input {
153 #sync-passphrase-warning {
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/
H A DProfileSyncService.java182 * Checks if a password or a passphrase is required for decryption of sync data.
184 * Returns NONE if the state is unavailable, or decryption passphrase/password is not required.
186 * @return the enum describing the decryption passphrase type required
192 // passphrase type we should tell the user we need.
202 * Returns the actual passphrase type being used for encryption. The sync backend must be
206 * should ask the user for a passphrase, you should instead use
221 * Returns true if the current explicit passphrase time is defined.
248 * Checks if sync is currently set to use a custom passphrase. The sync backend must be running
251 * @return true if sync is using a custom passphrase.
259 * Checks if we need a passphrase t
318 setEncryptionPassphrase(String passphrase, boolean isGaia) argument
328 setDecryptionPassphrase(String passphrase) argument
515 nativeSetDecryptionPassphrase( int nativeProfileSyncServiceAndroid, String passphrase) argument
517 nativeSetEncryptionPassphrase( int nativeProfileSyncServiceAndroid, String passphrase, boolean isGaia) argument
[all...]
/external/chromium/chrome/browser/sync/
H A Dsync_setup_flow.h63 // Fills |args| for the enter passphrase screen.
85 // The 'passphrase' screen is used when the user is prompted to enter
86 // an existing passphrase.
87 void OnPassphraseEntry(const std::string& passphrase);
89 // The user canceled the passphrase entry without supplying a passphrase.
92 // The 'first passphrase' screen is for users migrating from a build
93 // without passwords, who are prompted to make a passphrase choice.
96 const std::string& passphrase);
145 // Set to true if we've tried creating/setting an explicit passphrase, s
[all...]

Completed in 606 milliseconds

12345