Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 305) sorted by relevance

12345678910>>...13

/third_party/node/test/parallel/
Dtest-tls-passphrase.js46 passphrase: 'password', property
58 passphrase: 'password', property
73 passphrase: 'ignored', property
82 passphrase: 'password', property
97 passphrase: 'ignored', property
106 passphrase: 'password', property
121 passphrase: 'ignored', property
130 passphrase: 'password', property
145 passphrase: 'ignored', property
153 key: [{ pem: passKey, passphrase: 'password' }], property
[all …]
Dtest-crypto-rsa-dsa.js84 passphrase: 'password' property
89 passphrase: ec.encode('password') property
98 passphrase: 'password' property
105 passphrase: 'password' property
110 passphrase: 'password' property
116 passphrase: bufferPassword property
121 passphrase: bufferPassword property
129 passphrase: bufferPassword property
135 passphrase: bufferPassword property
142 passphrase: bufferPassword property
[all …]
Dtest-crypto-keygen.js203 passphrase: 'secret' property
225 const key = { key: privateKey, passphrase: 'secret' }; property
239 passphrase: 'secret' property
267 passphrase: 'secret' property
293 passphrase: 'secret' property
447 passphrase: 'secret', property
475 passphrase: 'secret' property
558 passphrase: 'secret' property
577 testSignVerify(publicKey, { key: privateKey, passphrase: 'secret' }); property
592 passphrase: 'secret' property
[all …]
Dtest-tls-ocsp-callback.js58 options.passphrase = testOptions.passphrase;
112 test({ ocsp: true, response: 'hello pfx', pfx: pfx, passphrase: 'sample' }); property
Dtest-tls-pfx-authorizationerror.js20 passphrase: 'sample', property
36 passphrase: 'sample', property
Dtest-crypto-publicDecrypt-fails-first-time.js25 passphrase: 'abcdef' property
34 passphrase: 'abcdef' property
/third_party/curl/tests/unit/
Dunit1394.c82 char *certname, *passphrase; variable
84 parse_cert_parameter(p[0], &certname, &passphrase);
107 if(passphrase) {
108 if(strcmp(p[2], passphrase)) {
110 "for -E param '%s'\n", p[2], passphrase, p[0]);
121 if(passphrase) {
123 "for -E param '%s'\n", passphrase, p[0]);
129 if(passphrase)
130 free(passphrase);
/third_party/node/lib/internal/tls/
Dsecure-context.js89 function setKey(context, key, passphrase, name) { argument
91 if (passphrase !== undefined && passphrase !== null)
92 validateString(passphrase, `${name}.passphrase`);
93 context.setKey(key, passphrase);
137 passphrase,
171 val?.passphrase !== undefined ? val.passphrase : passphrase);
175 setKey(context, key, passphrase, name);
270 const pass = val.passphrase || passphrase;
277 } else if (passphrase) {
278 context.loadPKCS12(toBuf(pfx), toBuf(passphrase));
/third_party/openssl/demos/encode/
Dec_encode.c29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument
63 if (passphrase != NULL) { in load_key()
65 (const unsigned char *)passphrase, in load_key()
66 strlen(passphrase)) == 0) { in load_key()
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument
121 selection = (passphrase != NULL) in store_key()
143 if (passphrase != NULL) { in store_key()
155 (const unsigned char *)passphrase, in store_key()
156 strlen(passphrase)) == 0) { in store_key()
Drsa_encode.c29 static EVP_PKEY *load_key(OSSL_LIB_CTX *libctx, FILE *f, const char *passphrase) in load_key() argument
63 if (passphrase != NULL) { in load_key()
65 (const unsigned char *)passphrase, in load_key()
66 strlen(passphrase)) == 0) { in load_key()
101 static int store_key(EVP_PKEY *pkey, FILE *f, const char *passphrase) in store_key() argument
121 selection = (passphrase != NULL) in store_key()
143 if (passphrase != NULL) { in store_key()
152 (const unsigned char *)passphrase, in store_key()
153 strlen(passphrase)) == 0) { in store_key()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
10 00:00:00:00:00:00 secret passphrase
11 00:11:22:33:44:55 another passphrase
13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
14 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
15 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 __attribute__ ((visibility ("default"))) int pbkdf2_sha1(const char *passphrase, const u8 *ssid, si… in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
/third_party/node/lib/internal/crypto/
Dkeys.js238 if (options.passphrase !== undefined) {
248 passphrase,
250 return this[kHandle].export(format, type, cipher, passphrase);
333 let cipher, passphrase, encoding;
335 ({ cipher, passphrase, encoding } = enc);
347 } else if (passphrase !== undefined) {
352 if ((isInput && passphrase !== undefined &&
353 !isStringOrBuffer(passphrase)) ||
354 (!isInput && cipher != null && !isStringOrBuffer(passphrase))) {
356 passphrase);
[all …]
Dsig.js122 const { data, format, type, passphrase } = preparePrivateKey(options, true);
131 const ret = this[kHandle].sign(data, format, type, passphrase, rsaPadding,
164 passphrase: keyPassphrase,
216 passphrase,
230 return this[kHandle].verify(data, format, type, passphrase, signature,
270 passphrase: keyPassphrase,
/third_party/rust/crates/rust-openssl/openssl/src/
Dmacros.rs6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> {
10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable
14 passphrase.as_ptr() as *const _ as *mut _))
58 passphrase: &[u8]
62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize);
66 passphrase.as_ptr() as *const _ as *mut _,
67 passphrase.len() as ::libc::c_int,
/third_party/openssl/doc/man3/
DPKCS12_gen_mac.pod34 I<pass> is the passphrase to use in the HMAC. I<salt> is the salt value to use,
46 regarding the encoding of the given passphrase. See L<passphrase-encoding(7)>
61 L<passphrase-encoding(7)>
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dieee802_11_auth.c380 char *passphrase; in decode_tunnel_passwords() local
388 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
395 if (passphrase == NULL) in decode_tunnel_passwords()
414 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
422 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
433 os_free(passphrase); in decode_tunnel_passwords()

12345678910>>...13