/third_party/node/test/parallel/ |
D | test-tls-passphrase.js | 46 passphrase: 'password', property 58 passphrase: 'password', property 73 passphrase: 'ignored', property 82 passphrase: 'password', property 97 passphrase: 'ignored', property 106 passphrase: 'password', property 121 passphrase: 'ignored', property 130 passphrase: 'password', property 145 passphrase: 'ignored', property 153 key: [{ pem: passKey, passphrase: 'password' }], property [all …]
|
D | test-crypto-rsa-dsa.js | 53 passphrase: 'password' property 59 passphrase: 'password' property 64 passphrase: 'password' property 70 passphrase: bufferPassword property 75 passphrase: bufferPassword property 83 passphrase: bufferPassword property 89 passphrase: bufferPassword property 96 passphrase: bufferPassword property 105 passphrase: bufferPassword property 111 passphrase: bufferPassword property [all …]
|
D | test-crypto-keygen.js | 168 passphrase: 'secret' property 185 const key = { key: privateKey, passphrase: 'secret' }; property 199 passphrase: 'secret' property 227 passphrase: 'secret' property 253 passphrase: 'secret' property 311 passphrase: 'secret', property 339 passphrase: 'secret' property 401 passphrase: 'secret' property 416 testSignVerify(publicKey, { key: privateKey, passphrase: 'secret' }); property 431 passphrase: 'secret' property [all …]
|
D | test-tls-ocsp-callback.js | 58 options.passphrase = testOptions.passphrase; 112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' }); property
|
D | test-tls-pfx-authorizationerror.js | 20 passphrase: 'sample', property 36 passphrase: 'sample', property
|
D | test-tls-multi-key.js | 77 passphrase: 'sample', property 112 passphrase: 'sample', property 131 passphrase: 'sample', property
|
/third_party/curl/tests/unit/ |
D | unit1394.c | 80 char *certname, *passphrase; variable 82 parse_cert_parameter(p[0], &certname, &passphrase); 105 if(passphrase) { 106 if(strcmp(p[2], passphrase)) { 108 "for -E param '%s'\n", p[2], passphrase, p[0]); 119 if(passphrase) { 121 "for -E param '%s'\n", passphrase, p[0]); 127 if(passphrase) 128 free(passphrase);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/ |
D | ssh-private.js | 73 if (typeof (options.passphrase) === 'string') { 74 options.passphrase = Buffer.from(options.passphrase, 77 if (!Buffer.isBuffer(options.passphrase)) { 82 var pass = new Uint8Array(options.passphrase); 148 var passphrase; 150 passphrase = options.passphrase; 151 if (typeof (passphrase) === 'string') 152 passphrase = Buffer.from(passphrase, 'utf-8'); 153 if (passphrase !== undefined) { 154 assert.buffer(passphrase, 'options.passphrase'); [all …]
|
D | pem.js | 70 if (typeof (options.passphrase) === 'string') { 71 options.passphrase = Buffer.from( 72 options.passphrase, 'utf-8'); 74 if (!Buffer.isBuffer(options.passphrase)) { 83 options.passphrase, 1).key;
|
/third_party/node/lib/ |
D | _tls_common.js | 139 const passphrase = options.passphrase; 146 c.context.setKey(pem, val.passphrase || passphrase); 150 c.context.setKey(key, passphrase); 261 const passphrase = pfx.passphrase || options.passphrase; 262 if (passphrase) { 263 c.context.loadPKCS12(buf, toBuf(passphrase)); 270 const passphrase = options.passphrase; 271 if (passphrase) { 272 c.context.loadPKCS12(buf, toBuf(passphrase));
|
/third_party/node/lib/internal/crypto/ |
D | keygen.js | 112 let privateFormat, privateType, cipher, passphrase; 120 passphrase 128 cipher, passphrase, publicType, publicFormat, privateType, privateFormat 137 let cipher, passphrase, publicType, publicFormat, privateType, privateFormat; 168 cipher, passphrase, wrap); 184 cipher, passphrase, wrap); 203 cipher, passphrase, wrap); 222 cipher, passphrase, wrap); 248 cipher, passphrase, wrap); 291 cipher, passphrase, wrap); [all …]
|
D | keys.js | 129 passphrase 131 return this[kHandle].export(format, type, cipher, passphrase); 208 let cipher, passphrase; 210 ({ cipher, passphrase } = enc); 222 } else if (passphrase !== undefined) { 227 if ((isInput && passphrase !== undefined && 228 !isStringOrBuffer(passphrase)) || 229 (!isInput && cipher != null && !isStringOrBuffer(passphrase))) { 231 passphrase); 235 return { format, type, cipher, passphrase }; [all …]
|
D | sig.js | 101 const { data, format, type, passphrase } = preparePrivateKey(options, true); 110 const ret = this[kHandle].sign(data, format, type, passphrase, rsaPadding, 139 passphrase: keyPassphrase 174 passphrase 188 return this[kHandle].verify(data, format, type, passphrase, signature, 208 passphrase: keyPassphrase
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 10 00:00:00:00:00:00 secret passphrase 11 00:11:22:33:44:55 another passphrase 13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 14 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 15 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/third_party/grpc/third_party/rake-compiler-dock/build/patches2/hoe-3.20.0/ |
D | 0001-Load-encrypted-private-key-using-ENV-GEM_PRIVATE_KEY.patch | 5 ENV['GEM_PRIVATE_KEY_PASSPHRASE'] as passphrase. 25 + passphrase = ENV['GEM_PRIVATE_KEY_PASSPHRASE'] 26 + spec.signing_key = OpenSSL::PKey::RSA.new(File.read(signing_key), passphrase)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_11_auth.c | 380 char *passphrase; in decode_tunnel_passwords() local 388 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 395 if (passphrase == NULL) in decode_tunnel_passwords() 414 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 422 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 433 os_free(passphrase); in decode_tunnel_passwords()
|