/external/curl/tests/unit/ |
D | unit1394.c | 80 char *certname, *passphrase; variable 82 parse_cert_parameter(p[0], &certname, &passphrase); 105 if(passphrase) { 106 if(strcmp(p[2], passphrase)) { 108 "for -E param '%s'\n", p[2], passphrase, p[0]); 119 if(passphrase) { 121 "for -E param '%s'\n", passphrase, p[0]); 127 if(passphrase) 128 free(passphrase);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/external/openssh/contrib/ |
D | gnome-ssh-askpass2.c | 92 char *passphrase, *local; in passphrase_dialog() local 187 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 189 local = g_locale_from_utf8(passphrase, in passphrase_dialog() 190 strlen(passphrase), NULL, NULL, NULL); in passphrase_dialog() 196 puts(passphrase); in passphrase_dialog() 200 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 201 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 202 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 203 g_free(passphrase); in passphrase_dialog()
|
D | gnome-ssh-askpass1.c | 70 char *passphrase; in passphrase_dialog() local 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog() 131 puts(passphrase); in passphrase_dialog() 134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para>
|
/external/autotest/client/cros/scripts/ |
D | wifi | 53 def configure(ssid, security, passphrase): argument 56 if passphrase is not None: 57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 184 passphrase = None 187 passphrase = args[2] 190 return configure(ssid, security, passphrase)
|
/external/openssh/ |
D | authfile.c | 69 const char *passphrase, const char *comment, in sshkey_save_private() argument 77 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private() 118 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument 135 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type() 144 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument 147 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private() 152 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument 162 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd() 313 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument 337 passphrase, &key, NULL)) != 0 || in sshkey_load_private_cert()
|
D | ssh-keygen.c | 1501 char new_comment[1024], *comment, *passphrase; in do_change_comment() local 1513 passphrase = xstrdup(""); in do_change_comment() 1519 passphrase = xstrdup(identity_passphrase); in do_change_comment() 1521 passphrase = xstrdup(identity_new_passphrase); in do_change_comment() 1523 passphrase = read_passphrase("Enter passphrase: ", in do_change_comment() 1526 if ((r = sshkey_load_private(identity_file, passphrase, in do_change_comment() 1528 freezero(passphrase, strlen(passphrase)); in do_change_comment() 1538 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment() 1553 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment() 1561 free(passphrase); in do_change_comment() [all …]
|
/external/openssh/contrib/cygwin/ |
D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1
|
/external/autotest/server/brillo/ |
D | host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): argument 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowWifiP2pGroup.java | 19 public void setPassphrase(String passphrase) { in setPassphrase() argument 20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase); in setPassphrase()
|
/external/ImageMagick/MagickCore/ |
D | cipher.c | 539 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 547 if (passphrase == (const char *) NULL) in DecipherImage() 549 passkey=StringToStringInfo(passphrase); in DecipherImage() 749 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 757 if (passphrase == (const char *) NULL) in EncipherImage() 759 passkey=StringToStringInfo(passphrase); in EncipherImage() 1110 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 1118 (void) passphrase; in DecipherImage() 1166 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 1174 (void) passphrase; in EncipherImage()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 380 char *passphrase; in decode_tunnel_passwords() local 388 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 395 if (passphrase == NULL) in decode_tunnel_passwords() 414 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 422 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 433 os_free(passphrase); in decode_tunnel_passwords()
|
/external/grpc-grpc-java/buildscripts/kokoro/ |
D | upload_artifacts.sh | 58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
|
/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_datatypes.py | 234 def __init__(self, guid, passphrase=None, autoconnect=None): argument 246 self.passphrase = passphrase
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.4/ |
D | p2p_iface.cpp | 238 const std::string& passphrase) in addGroupClientNetwork() argument 271 wpa_network->passphrase = dup_binstr(passphrase.c_str(), passphrase.length()); in addGroupClientNetwork() 272 if (wpa_network->passphrase == NULL) { in addGroupClientNetwork() 390 const std::string& passphrase) in joinGroup() argument 401 wpa_s, group_owner_bssid, ssid, passphrase); in joinGroup() 426 std::string passphrase = ""; in notifyGroupJoinFailure() local 428 wpa_s, zero_addr, ssid, passphrase); in notifyGroupJoinFailure() 917 const hidl_vec<uint8_t>& ssid, const hidl_string& passphrase, in addGroup_1_2() argument 924 ssid, passphrase, persistent, freq, peer_address, join); in addGroup_1_2() 1733 const std::vector<uint8_t>& ssid, const std::string& passphrase, in addGroup_1_2Internal() argument [all …]
|
/external/testng/ |
D | README.dev | 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy 36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 409 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 468 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 475 p = fgets(passphrase, len, stdin); in get_passphrase() 482 p = strrchr(passphrase, '\n'); in get_passphrase() 484 p = passphrase + len - 1; in get_passphrase()
|
/external/freetype/docs/ |
D | release | 104 unset passphrase 106 PATH=/empty echo -n "Enter GPG passphrase: " 108 read -r passphrase 124 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
|
/external/f2fs-tools/tools/ |
D | f2fscrypt.c | 451 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 455 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 479 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 481 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 514 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 521 p = fgets(passphrase, len, stdin); in get_passphrase() 528 p = strrchr(passphrase, '\n'); in get_passphrase() 530 p = passphrase + len - 1; in get_passphrase()
|
/external/wpa_supplicant_8/hostapd/hidl/1.3/ |
D | hostapd.cpp | 314 nw_params.V1_2.passphrase.size(), in CreateHostapdConfig() 326 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig() 330 nw_params.V1_2.passphrase.size(), in CreateHostapdConfig() 342 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig() 346 nw_params.V1_2.passphrase.size(), in CreateHostapdConfig() 362 nw_params.V1_2.passphrase.c_str(), in CreateHostapdConfig() 363 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig() 366 if (!validatePassphrase(nw_params.V1_2.passphrase.size(), 1, -1)) { in CreateHostapdConfig() 379 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig()
|
/external/python/pyopenssl/src/OpenSSL/ |
D | crypto.py | 2009 def dump_privatekey(type, pkey, cipher=None, passphrase=None): argument 2031 if passphrase is None: 2042 helper = _PassphraseHelper(type, passphrase) 2624 def export(self, passphrase=None, iter=2048, maciter=1): argument 2644 passphrase = _text_to_bytes_and_warn("passphrase", passphrase) 2654 if passphrase is None: 2655 passphrase = _ffi.NULL 2672 passphrase, 2783 def __init__(self, type, passphrase, more_args=False, truncate=False): argument 2784 if type != FILETYPE_PEM and passphrase is not None: [all …]
|