/external/curl/tests/unit/ |
D | unit1394.c | 80 char *certname, *passphrase; variable 82 parse_cert_parameter(p[0], &certname, &passphrase); 105 if(passphrase) { 106 if(strcmp(p[2], passphrase)) { 108 "for -E param '%s'\n", p[2], passphrase, p[0]); 119 if(passphrase) { 121 "for -E param '%s'\n", passphrase, p[0]); 126 if(passphrase) free(passphrase);
|
/external/openssh/contrib/ |
D | gnome-ssh-askpass2.c | 88 char *passphrase, *local; in passphrase_dialog() local 169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 171 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog() 178 puts(passphrase); in passphrase_dialog() 183 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 185 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 186 g_free(passphrase); in passphrase_dialog()
|
D | gnome-ssh-askpass1.c | 70 char *passphrase; in passphrase_dialog() local 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog() 131 puts(passphrase); in passphrase_dialog() 134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/autotest/client/cros/scripts/ |
D | wifi | 53 def configure(ssid, security, passphrase): argument 56 if passphrase is not None: 57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 184 passphrase = None 187 passphrase = args[2] 190 return configure(ssid, security, passphrase)
|
/external/openssh/contrib/cygwin/ |
D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1
|
/external/openssh/ |
D | authfile.c | 77 const char *passphrase, const char *comment, in sshkey_save_private() argument 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private() 211 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument 235 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type() 242 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument 256 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd() 268 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument 291 (r = sshkey_parse_private_fileblob(buffer, passphrase, keyp, in sshkey_load_private() 453 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument 476 passphrase, &key, NULL, perm_ok)) != 0 || in sshkey_load_private_cert()
|
D | key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, in key_save_private() argument 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, in key_save_private() 360 key_load_private(const char *path, const char *passphrase, in key_load_private() argument 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { in key_load_private() 380 key_load_private_cert(int type, const char *filename, const char *passphrase, in key_load_private_cert() argument 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, in key_load_private_cert() 401 key_load_private_type(int type, const char *filename, const char *passphrase, in key_load_private_type() argument 407 if ((r = sshkey_load_private_type(type, filename, passphrase, in key_load_private_type()
|
D | sshconnect1.c | 224 char buf[300], *passphrase = NULL, *comment, *authfile; in try_rsa_authentication() local 277 passphrase = read_passphrase(buf, 0); in try_rsa_authentication() 278 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication() 280 authfile, passphrase, NULL, NULL); in try_rsa_authentication() 293 maybe_add_key_to_agent(authfile, private, comment, passphrase); in try_rsa_authentication() 295 if (passphrase != NULL) { in try_rsa_authentication() 296 explicit_bzero(passphrase, strlen(passphrase)); in try_rsa_authentication() 297 free(passphrase); in try_rsa_authentication()
|
D | ssh-add.0 | 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries 22 the last passphrase if multiple identity files are given. 77 If ssh-add needs a passphrase, it will read the passphrase from 82 read the passphrase. This is particularly useful when calling
|
/external/autotest/server/brillo/ |
D | host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): argument 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
/external/autotest/server/site_tests/brillo_PingTest/ |
D | brillo_PingTest.py | 26 def run_once(self, host=None, ssid=None, passphrase=None, argument 44 passphrase = global_config.global_config.get_config_value( 48 (ssid, passphrase))
|
/external/wpa_supplicant_8/hostapd/hidl/1.2/ |
D | hostapd.cpp | 246 nw_params.passphrase.size(), in CreateHostapdConfig() 257 nw_params.passphrase.c_str()); in CreateHostapdConfig() 261 nw_params.passphrase.size(), in CreateHostapdConfig() 272 nw_params.passphrase.c_str()); in CreateHostapdConfig() 276 nw_params.passphrase.size(), in CreateHostapdConfig() 291 nw_params.passphrase.c_str(), in CreateHostapdConfig() 292 nw_params.passphrase.c_str()); in CreateHostapdConfig() 295 if (!validatePassphrase(nw_params.passphrase.size(), 1, -1)) { in CreateHostapdConfig() 305 nw_params.passphrase.c_str()); in CreateHostapdConfig()
|
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/ |
D | brillo_WifiInterfaceTest.py | 45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, argument 62 passphrase = global_config.global_config.get_config_value( 64 with host_utils.connect_to_ssid(host, ssid, passphrase):
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowWifiP2pGroup.java | 19 public void setPassphrase(String passphrase) { in setPassphrase() argument 20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase); in setPassphrase()
|
/external/ImageMagick/MagickCore/ |
D | cipher.c | 537 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 545 if (passphrase == (const char *) NULL) in DecipherImage() 547 passkey=StringToStringInfo(passphrase); in DecipherImage() 747 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 755 if (passphrase == (const char *) NULL) in EncipherImage() 757 passkey=StringToStringInfo(passphrase); in EncipherImage() 1106 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 1114 (void) passphrase; in DecipherImage() 1162 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 1170 (void) passphrase; in EncipherImage()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 380 char *passphrase; in decode_tunnel_passwords() local 388 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 395 if (passphrase == NULL) in decode_tunnel_passwords() 414 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 422 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 433 os_free(passphrase); in decode_tunnel_passwords()
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.3/ |
D | p2p_iface.cpp | 155 const std::string& passphrase) in addGroupClientNetwork() argument 188 wpa_network->passphrase = dup_binstr(passphrase.c_str(), passphrase.length()); in addGroupClientNetwork() 189 if (wpa_network->passphrase == NULL) { in addGroupClientNetwork() 340 const std::string& passphrase) in joinGroup() argument 351 wpa_s, group_owner_bssid, ssid, passphrase); in joinGroup() 376 std::string passphrase = ""; in notifyGroupJoinFailure() local 378 wpa_s, zero_addr, ssid, passphrase); in notifyGroupJoinFailure() 867 const hidl_vec<uint8_t>& ssid, const hidl_string& passphrase, in addGroup_1_2() argument 874 ssid, passphrase, persistent, freq, peer_address, join); in addGroup_1_2() 1650 const std::vector<uint8_t>& ssid, const std::string& passphrase, in addGroup_1_2Internal() argument [all …]
|
/external/grpc-grpc-java/buildscripts/kokoro/ |
D | upload_artifacts.sh | 58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
|
/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_datatypes.py | 234 def __init__(self, guid, passphrase=None, autoconnect=None): argument 246 self.passphrase = passphrase
|
/external/testng/ |
D | README.dev | 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy 36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
|