/third_party/node/test/parallel/ |
D | test-tls-passphrase.js | 46 passphrase: 'password', property 58 passphrase: 'password', property 73 passphrase: 'ignored', property 82 passphrase: 'password', property 97 passphrase: 'ignored', property 106 passphrase: 'password', property 121 passphrase: 'ignored', property 130 passphrase: 'password', property 145 passphrase: 'ignored', property 153 key: [{ pem: passKey, passphrase: 'password' }], property [all …]
|
D | test-crypto-rsa-dsa.js | 84 passphrase: 'password' property 89 passphrase: ec.encode('password') property 98 passphrase: 'password' property 105 passphrase: 'password' property 110 passphrase: 'password' property 116 passphrase: bufferPassword property 121 passphrase: bufferPassword property 129 passphrase: bufferPassword property 135 passphrase: bufferPassword property 142 passphrase: bufferPassword property [all …]
|
D | test-crypto-keygen.js | 203 passphrase: 'secret' property 225 const key = { key: privateKey, passphrase: 'secret' }; property 239 passphrase: 'secret' property 267 passphrase: 'secret' property 293 passphrase: 'secret' property 447 passphrase: 'secret', property 475 passphrase: 'secret' property 558 passphrase: 'secret' property 577 testSignVerify(publicKey, { key: privateKey, passphrase: 'secret' }); property 592 passphrase: 'secret' property [all …]
|
D | test-tls-ocsp-callback.js | 58 options.passphrase = testOptions.passphrase; 112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' }); property
|
D | test-tls-pfx-authorizationerror.js | 20 passphrase: 'sample', property 36 passphrase: 'sample', property
|
D | test-crypto-publicDecrypt-fails-first-time.js | 25 passphrase: 'abcdef' property 34 passphrase: 'abcdef' property
|
/third_party/curl/tests/unit/ |
D | unit1394.c | 82 char *certname, *passphrase; variable 84 parse_cert_parameter(p[0], &certname, &passphrase); 107 if(passphrase) { 108 if(strcmp(p[2], passphrase)) { 110 "for -E param '%s'\n", p[2], passphrase, p[0]); 121 if(passphrase) { 123 "for -E param '%s'\n", passphrase, p[0]); 129 if(passphrase) 130 free(passphrase);
|
/third_party/node/lib/internal/tls/ |
D | secure-context.js | 89 function setKey(context, key, passphrase, name) { argument 91 if (passphrase !== undefined && passphrase !== null) 92 validateString(passphrase, `${name}.passphrase`); 93 context.setKey(key, passphrase); 137 passphrase, 171 val?.passphrase !== undefined ? val.passphrase : passphrase); 175 setKey(context, key, passphrase, name); 270 const pass = val.passphrase || passphrase; 277 } else if (passphrase) { 278 context.loadPKCS12(toBuf(pfx), toBuf(passphrase));
|
/third_party/openssl/demos/encode/ |
D | ec_encode.c | 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument 63 if (passphrase != NULL) { in load_key() 65 (const unsigned char *)passphrase, in load_key() 66 strlen(passphrase)) == 0) { in load_key() 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument 121 selection = (passphrase != NULL) in store_key() 143 if (passphrase != NULL) { in store_key() 155 (const unsigned char *)passphrase, in store_key() 156 strlen(passphrase)) == 0) { in store_key()
|
D | rsa_encode.c | 29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument 63 if (passphrase != NULL) { in load_key() 65 (const unsigned char *)passphrase, in load_key() 66 strlen(passphrase)) == 0) { in load_key() 101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument 121 selection = (passphrase != NULL) in store_key() 143 if (passphrase != NULL) { in store_key() 152 (const unsigned char *)passphrase, in store_key() 153 strlen(passphrase)) == 0) { in store_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 10 00:00:00:00:00:00 secret passphrase 11 00:11:22:33:44:55 another passphrase 13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 14 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 15 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para>
|
/third_party/node/lib/internal/crypto/ |
D | keys.js | 238 if (options.passphrase !== undefined) { 248 passphrase, 250 return this[kHandle].export(format, type, cipher, passphrase); 333 let cipher, passphrase, encoding; 335 ({ cipher, passphrase, encoding } = enc); 347 } else if (passphrase !== undefined) { 352 if ((isInput && passphrase !== undefined && 353 !isStringOrBuffer(passphrase)) || 354 (!isInput && cipher != null && !isStringOrBuffer(passphrase))) { 356 passphrase); [all …]
|
D | sig.js | 122 const { data, format, type, passphrase } = preparePrivateKey(options, true); 131 const ret = this[kHandle].sign(data, format, type, passphrase, rsaPadding, 164 passphrase: keyPassphrase, 216 passphrase, 230 return this[kHandle].verify(data, format, type, passphrase, signature, 270 passphrase: keyPassphrase,
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | macros.rs | 6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> { 10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable 14 passphrase.as_ptr() as *const _ as *mut _)) 58 passphrase: &[u8] 62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize); 66 passphrase.as_ptr() as *const _ as *mut _, 67 passphrase.len() as ::libc::c_int,
|
/third_party/openssl/doc/man3/ |
D | PKCS12_gen_mac.pod | 34 I<pass> is the passphrase to use in the HMAC. I<salt> is the salt value to use, 46 regarding the encoding of the given passphrase. See L<passphrase-encoding(7)> 61 L<passphrase-encoding(7)>
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_11_auth.c | 380 char *passphrase; in decode_tunnel_passwords() local 388 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 395 if (passphrase == NULL) in decode_tunnel_passwords() 414 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 422 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 433 os_free(passphrase); in decode_tunnel_passwords()
|