Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 231) sorted by relevance

12345678910

/external/curl/tests/unit/
Dunit1394.c80 char *certname, *passphrase; variable
82 parse_cert_parameter(p[0], &certname, &passphrase);
105 if(passphrase) {
106 if(strcmp(p[2], passphrase)) {
108 "for -E param '%s'\n", p[2], passphrase, p[0]);
119 if(passphrase) {
121 "for -E param '%s'\n", passphrase, p[0]);
127 if(passphrase)
128 free(passphrase);
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
/external/openssh/contrib/
Dgnome-ssh-askpass2.c92 char *passphrase, *local; in passphrase_dialog() local
187 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog()
189 local = g_locale_from_utf8(passphrase, in passphrase_dialog()
190 strlen(passphrase), NULL, NULL, NULL); in passphrase_dialog()
196 puts(passphrase); in passphrase_dialog()
200 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog()
201 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
202 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
203 g_free(passphrase); in passphrase_dialog()
Dgnome-ssh-askpass1.c70 char *passphrase; in passphrase_dialog() local
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog()
131 puts(passphrase); in passphrase_dialog()
134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
/external/autotest/client/cros/scripts/
Dwifi53 def configure(ssid, security, passphrase): argument
56 if passphrase is not None:
57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
184 passphrase = None
187 passphrase = args[2]
190 return configure(ssid, security, passphrase)
/external/openssh/
Dauthfile.c69 const char *passphrase, const char *comment, in sshkey_save_private() argument
77 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private()
118 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument
135 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type()
144 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument
147 return sshkey_load_private_type(KEY_UNSPEC, filename, passphrase, in sshkey_load_private()
152 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument
162 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd()
313 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument
337 passphrase, &key, NULL)) != 0 || in sshkey_load_private_cert()
Dssh-keygen.c1501 char new_comment[1024], *comment, *passphrase; in do_change_comment() local
1513 passphrase = xstrdup(""); in do_change_comment()
1519 passphrase = xstrdup(identity_passphrase); in do_change_comment()
1521 passphrase = xstrdup(identity_new_passphrase); in do_change_comment()
1523 passphrase = read_passphrase("Enter passphrase: ", in do_change_comment()
1526 if ((r = sshkey_load_private(identity_file, passphrase, in do_change_comment()
1528 freezero(passphrase, strlen(passphrase)); in do_change_comment()
1538 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment()
1553 explicit_bzero(passphrase, strlen(passphrase)); in do_change_comment()
1561 free(passphrase); in do_change_comment()
[all …]
/external/openssh/contrib/cygwin/
Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
/external/autotest/server/brillo/
Dhost_utils.py53 def connect_to_ssid(host, ssid, passphrase): argument
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowWifiP2pGroup.java19 public void setPassphrase(String passphrase) { in setPassphrase() argument
20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase); in setPassphrase()
/external/ImageMagick/MagickCore/
Dcipher.c539 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
547 if (passphrase == (const char *) NULL) in DecipherImage()
549 passkey=StringToStringInfo(passphrase); in DecipherImage()
749 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
757 if (passphrase == (const char *) NULL) in EncipherImage()
759 passkey=StringToStringInfo(passphrase); in EncipherImage()
1110 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
1118 (void) passphrase; in DecipherImage()
1166 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
1174 (void) passphrase; in EncipherImage()
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c380 char *passphrase; in decode_tunnel_passwords() local
388 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
395 if (passphrase == NULL) in decode_tunnel_passwords()
414 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
422 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
433 os_free(passphrase); in decode_tunnel_passwords()
/external/grpc-grpc-java/buildscripts/kokoro/
Dupload_artifacts.sh58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_datatypes.py234 def __init__(self, guid, passphrase=None, autoconnect=None): argument
246 self.passphrase = passphrase
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.4/
Dp2p_iface.cpp238 const std::string& passphrase) in addGroupClientNetwork() argument
271 wpa_network->passphrase = dup_binstr(passphrase.c_str(), passphrase.length()); in addGroupClientNetwork()
272 if (wpa_network->passphrase == NULL) { in addGroupClientNetwork()
390 const std::string& passphrase) in joinGroup() argument
401 wpa_s, group_owner_bssid, ssid, passphrase); in joinGroup()
426 std::string passphrase = ""; in notifyGroupJoinFailure() local
428 wpa_s, zero_addr, ssid, passphrase); in notifyGroupJoinFailure()
917 const hidl_vec<uint8_t>& ssid, const hidl_string& passphrase, in addGroup_1_2() argument
924 ssid, passphrase, persistent, freq, peer_address, join); in addGroup_1_2()
1733 const std::vector<uint8_t>& ssid, const std::string& passphrase, in addGroup_1_2Internal() argument
[all …]
/external/testng/
DREADME.dev33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy
36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
/external/e2fsprogs/misc/
De4crypt.c405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
409 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
468 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
475 p = fgets(passphrase, len, stdin); in get_passphrase()
482 p = strrchr(passphrase, '\n'); in get_passphrase()
484 p = passphrase + len - 1; in get_passphrase()
/external/freetype/docs/
Drelease104 unset passphrase
106 PATH=/empty echo -n "Enter GPG passphrase: "
108 read -r passphrase
124 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
/external/f2fs-tools/tools/
Df2fscrypt.c451 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
455 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
479 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
481 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
514 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
521 p = fgets(passphrase, len, stdin); in get_passphrase()
528 p = strrchr(passphrase, '\n'); in get_passphrase()
530 p = passphrase + len - 1; in get_passphrase()
/external/wpa_supplicant_8/hostapd/hidl/1.3/
Dhostapd.cpp314 nw_params.V1_2.passphrase.size(), in CreateHostapdConfig()
326 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig()
330 nw_params.V1_2.passphrase.size(), in CreateHostapdConfig()
342 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig()
346 nw_params.V1_2.passphrase.size(), in CreateHostapdConfig()
362 nw_params.V1_2.passphrase.c_str(), in CreateHostapdConfig()
363 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig()
366 if (!validatePassphrase(nw_params.V1_2.passphrase.size(), 1, -1)) { in CreateHostapdConfig()
379 nw_params.V1_2.passphrase.c_str()); in CreateHostapdConfig()
/external/python/pyopenssl/src/OpenSSL/
Dcrypto.py2009 def dump_privatekey(type, pkey, cipher=None, passphrase=None): argument
2031 if passphrase is None:
2042 helper = _PassphraseHelper(type, passphrase)
2624 def export(self, passphrase=None, iter=2048, maciter=1): argument
2644 passphrase = _text_to_bytes_and_warn("passphrase", passphrase)
2654 if passphrase is None:
2655 passphrase = _ffi.NULL
2672 passphrase,
2783 def __init__(self, type, passphrase, more_args=False, truncate=False): argument
2784 if type != FILETYPE_PEM and passphrase is not None:
[all …]

12345678910