Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 239) sorted by relevance

12345678910

/third_party/node/test/parallel/
Dtest-tls-passphrase.js46 passphrase: 'password', property
58 passphrase: 'password', property
73 passphrase: 'ignored', property
82 passphrase: 'password', property
97 passphrase: 'ignored', property
106 passphrase: 'password', property
121 passphrase: 'ignored', property
130 passphrase: 'password', property
145 passphrase: 'ignored', property
153 key: [{ pem: passKey, passphrase: 'password' }], property
[all …]
Dtest-crypto-rsa-dsa.js53 passphrase: 'password' property
59 passphrase: 'password' property
64 passphrase: 'password' property
70 passphrase: bufferPassword property
75 passphrase: bufferPassword property
83 passphrase: bufferPassword property
89 passphrase: bufferPassword property
96 passphrase: bufferPassword property
105 passphrase: bufferPassword property
111 passphrase: bufferPassword property
[all …]
Dtest-crypto-keygen.js168 passphrase: 'secret' property
185 const key = { key: privateKey, passphrase: 'secret' }; property
199 passphrase: 'secret' property
227 passphrase: 'secret' property
253 passphrase: 'secret' property
311 passphrase: 'secret', property
339 passphrase: 'secret' property
401 passphrase: 'secret' property
416 testSignVerify(publicKey, { key: privateKey, passphrase: 'secret' }); property
431 passphrase: 'secret' property
[all …]
Dtest-tls-ocsp-callback.js58 options.passphrase = testOptions.passphrase;
112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' }); property
/third_party/openssl/demos/encode/
Dec_encode.c29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument
63 if (passphrase != NULL) { in load_key()
65 (const unsigned char *)passphrase, in load_key()
66 strlen(passphrase)) == 0) { in load_key()
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument
121 selection = (passphrase != NULL) in store_key()
143 if (passphrase != NULL) { in store_key()
155 (const unsigned char *)passphrase, in store_key()
156 strlen(passphrase)) == 0) { in store_key()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
/third_party/node/deps/npm/node_modules/sshpk/lib/formats/
Dssh-private.js73 if (typeof (options.passphrase) === 'string') {
74 options.passphrase = Buffer.from(options.passphrase,
77 if (!Buffer.isBuffer(options.passphrase)) {
82 var pass = new Uint8Array(options.passphrase);
148 var passphrase;
150 passphrase = options.passphrase;
151 if (typeof (passphrase) === 'string')
152 passphrase = Buffer.from(passphrase, 'utf-8');
153 if (passphrase !== undefined) {
154 assert.buffer(passphrase, 'options.passphrase');
[all …]
Dpem.js70 if (typeof (options.passphrase) === 'string') {
71 options.passphrase = Buffer.from(
72 options.passphrase, 'utf-8');
74 if (!Buffer.isBuffer(options.passphrase)) {
83 options.passphrase, 1).key;
/third_party/node/lib/
D_tls_common.js139 const passphrase = options.passphrase;
146 c.context.setKey(pem, val.passphrase || passphrase);
150 c.context.setKey(key, passphrase);
261 const passphrase = pfx.passphrase || options.passphrase;
262 if (passphrase) {
263 c.context.loadPKCS12(buf, toBuf(passphrase));
270 const passphrase = options.passphrase;
271 if (passphrase) {
272 c.context.loadPKCS12(buf, toBuf(passphrase));
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/third_party/node/lib/internal/crypto/
Dkeygen.js112 let privateFormat, privateType, cipher, passphrase;
120 passphrase
128 cipher, passphrase, publicType, publicFormat, privateType, privateFormat
137 let cipher, passphrase, publicType, publicFormat, privateType, privateFormat;
168 cipher, passphrase, wrap);
184 cipher, passphrase, wrap);
203 cipher, passphrase, wrap);
222 cipher, passphrase, wrap);
248 cipher, passphrase, wrap);
291 cipher, passphrase, wrap);
[all …]
Dkeys.js129 passphrase
131 return this[kHandle].export(format, type, cipher, passphrase);
208 let cipher, passphrase;
210 ({ cipher, passphrase } = enc);
222 } else if (passphrase !== undefined) {
227 if ((isInput && passphrase !== undefined &&
228 !isStringOrBuffer(passphrase)) ||
229 (!isInput && cipher != null && !isStringOrBuffer(passphrase))) {
231 passphrase);
235 return { format, type, cipher, passphrase };
[all …]
Dsig.js101 const { data, format, type, passphrase } = preparePrivateKey(options, true);
110 const ret = this[kHandle].sign(data, format, type, passphrase, rsaPadding,
139 passphrase: keyPassphrase
174 passphrase
188 return this[kHandle].verify(data, format, type, passphrase, signature,
208 passphrase: keyPassphrase
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
10 00:00:00:00:00:00 secret passphrase
11 00:11:22:33:44:55 another passphrase
13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
14 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
15 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
/third_party/rust/crates/rust-openssl/openssl/src/
Dmacros.rs6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> {
10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable
14 passphrase.as_ptr() as *const _ as *mut _))
58 passphrase: &[u8]
62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize);
66 passphrase.as_ptr() as *const _ as *mut _,
67 passphrase.len() as ::libc::c_int,
/third_party/openssl/doc/man3/
DPKCS12_gen_mac.pod34 I<pass> is the passphrase to use in the HMAC. I<salt> is the salt value to use,
46 regarding the encoding of the given passphrase. See L<passphrase-encoding(7)>
61 L<passphrase-encoding(7)>
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dieee802_11_auth.c380 char *passphrase; in decode_tunnel_passwords() local
388 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
395 if (passphrase == NULL) in decode_tunnel_passwords()
414 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
422 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
433 os_free(passphrase); in decode_tunnel_passwords()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dieee802_11_auth.c445 char *passphrase; in decode_tunnel_passwords() local
453 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
460 if (passphrase == NULL) in decode_tunnel_passwords()
479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
487 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
498 os_free(passphrase); in decode_tunnel_passwords()

12345678910