| /external/python/google-auth-library-python/google/auth/transport/ |
| D | _mtls_helper.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 30 b"-----BEGIN CERTIFICATE-----.+-----END CERTIFICATE-----\r?\n?", re.DOTALL 34 # "-----BEGIN PRIVATE KEY-----...", 35 # "-----BEGIN EC PRIVATE KEY-----...", 36 # "-----BEGIN RSA PRIVATE KEY-----..." 37 # "-----BEGIN ENCRYPTED PRIVATE KEY-----" 39 b"-----BEGIN [A-Z ]*PRIVATE KEY-----.+-----END [A-Z ]*PRIVATE KEY-----\r?\n?", 47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL 92 passphrase. 100 bytes in PEM format and passphrase bytes. [all …]
|
| /external/python/google-auth-library-python/tests/transport/ |
| D | test__mtls_helper.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 29 ENCRYPTED_EC_PRIVATE_KEY = b"""-----BEGIN ENCRYPTED PRIVATE KEY----- 35 -----END ENCRYPTED PRIVATE KEY-----""" 37 EC_PUBLIC_KEY = b"""-----BEGIN PUBLIC KEY----- 40 -----END PUBLIC KEY-----""" 42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable 44 -----END PASSPHRASE-----""" 92 KEY = b"""-----BEGIN PRIVATE KEY----- 95 -----END PRIVATE KEY-----""" 96 RSA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- [all …]
|
| /external/wpa_supplicant_8/wpa_supplicant/ |
| D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 3 * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi> 19 char *ssid, *passphrase, buf[64], *pos; in main() local 23 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main() 24 "\nIf passphrase is left out, it will be read from " in main() 32 passphrase = argv[2]; in main() 34 fprintf(stderr, "# reading passphrase from stdin\n"); in main() 36 fprintf(stderr, "Failed to read passphrase\n"); in main() 39 buf[sizeof(buf) - 1] = '\0'; in main() 48 passphrase = buf; in main() [all …]
|
| /external/curl/tests/unit/ |
| D | unit1394.c | 8 * Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al. 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 80 char *certname, *passphrase; variable 82 parse_cert_parameter(p[0], &certname, &passphrase); 87 "for -E param '%s'\n", p[1], certname, p[0]); 93 "for -E param '%s'\n", p[1], p[0]); 100 "for -E param '%s'\n", certname, p[0]); 105 if(passphrase) { 106 if(strcmp(p[2], passphrase)) { 107 printf("expected passphrase '%s' but got '%s'" [all …]
|
| /external/wpa_supplicant_8/hostapd/ |
| D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 5 # characters or as a 256-bit hex PSK (64 hex digits). 13 # per-Enrollee PSK. 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
| /external/wpa_supplicant_8/src/crypto/ |
| D | sha1-pbkdf2.c | 2 * SHA1-based key derivation function (PBKDF2) for IEEE 802.11i 3 * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi> 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 33 * Uc = PRF(P, Uc-1) in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 42 return -1; in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 48 return -1; in pbkdf2_sha1_f() 61 * pbkdf2_sha1 - SHA1-based key derivation function (PBKDF2) for IEEE 802.11i [all …]
|
| /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
| D | wpa_passphrase.sgml | 1 <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"> 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 27 <para><command>wpa_passphrase</command> pre-computes PSK entries for 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 30 and SSID are used to generate a 256-bit PSK.</para> 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para> [all …]
|
| /external/autotest/client/cros/scripts/ |
| D | wifi | 4 # Use of this source code is governed by a BSD-style license that can be 36 print cmd, 'connect <ssid> [passphrase] [security]' 37 print ' |security| defaults to "psk" when |passphrase|', 47 print cmd, 'configure <ssid> [passphrase] [security]' 48 print ' |security| defaults to "psk" when |passphrase|', 53 def configure(ssid, security, passphrase): argument 56 if passphrase is not None: 57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 76 like the passphrase for psk security. 127 like the passphrase for psk security. [all …]
|
| /external/autotest/server/brillo/ |
| D | host_utils.py | 2 # Use of this source code is governed by a BSD-style license that can be 14 _RUN_BACKGROUND_TEMPLATE = '( %(cmd)s ) </dev/null >/dev/null 2>&1 & echo -n $!' 18 while test ${to} -ne 0; do \ 19 test $(ps %(pid)d | wc -l) -gt 1 || break; \ 21 to=$((to - 1)); \ 23 test ${to} -ne 0 -o $(ps %(pid)d | wc -l) -eq 1 \ 39 def wait_for_process(host, pid, timeout=-1): 53 def connect_to_ssid(host, ssid, passphrase): argument 59 @param passphrase: A string representing the passphrase to the ssid. 75 'service weaved \/system\/bin\/weaved --disable_privet/\' ' [all …]
|
| /external/ImageMagick/www/ |
| D | cipher.html | 8 <meta charset="utf-8" /> 9 <meta name="viewport" content="width=device-width, initial-scale=1" /> 10 <title>ImageMagick - Encipher or Decipher an Image</title> 11 <meta name="application-name" content="ImageMagick" /> 13 <meta name="application-url" content="https://imagemagick.org" /> 20 <meta name="revisit-after" content="2 DAYS" /> 21 <meta name="resource-type" content="document" /> 22 <meta name="copyright" content="Copyright (c) 1999-2020 ImageMagick Studio LLC" /> 24 <meta name="magick-serial" content="P131-S030410-R485315270133-P82224-A6668-G1245-1" /> 31 <meta name="google-site-verification" content="_bMOCDpkx9ZAzBwb2kF3PRHbfUUdFj2uO8Jd1AXArz4" /> [all …]
|
| /external/python/pyopenssl/tests/ |
| D | test_crypto.py | 1 # Copyright (c) Jean-Paul Calderone 70 old_root_cert_pem = b"""-----BEGIN CERTIFICATE----- 87 -----END CERTIFICATE----- 90 root_cert_pem = b"""-----BEGIN CERTIFICATE----- 118 -----END CERTIFICATE----- 121 root_key_pem = b"""-----BEGIN RSA PRIVATE KEY----- 159 -----END RSA PRIVATE KEY----- 206 intermediate_cert_pem = b"""-----BEGIN CERTIFICATE----- 231 -----END CERTIFICATE----- 234 intermediate_key_pem = b"""-----BEGIN RSA PRIVATE KEY----- [all …]
|
| /external/ImageMagick/www/api/ |
| D | cipher.html | 8 <meta charset="utf-8" /> 9 <meta name="viewport" content="width=device-width, initial-scale=1" /> 10 <title>ImageMagick - MagickCore, C API: Convert to and from Cipher Pixels</title> 11 <meta name="application-name" content="ImageMagick" /> 13 <meta name="application-url" content="https://imagemagick.org" /> 20 <meta name="revisit-after" content="2 DAYS" /> 21 <meta name="resource-type" content="document" /> 22 <meta name="copyright" content="Copyright (c) 1999-2020 ImageMagick Studio LLC" /> 24 <meta name="magick-serial" content="P131-S030410-R485315270133-P82224-A6668-G1245-1" /> 31 <meta name="google-site-verification" content="_bMOCDpkx9ZAzBwb2kF3PRHbfUUdFj2uO8Jd1AXArz4" /> [all …]
|
| /external/grpc-grpc-java/buildscripts/kokoro/ |
| D | upload_artifacts.sh | 2 set -veux -o pipefail 4 if [[ -f /VERSION ]]; then 14 LOCAL_MVN_ARTIFACTS="$KOKORO_GFILE_DIR"/github/grpc-java/mvn-artifacts/ 18 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'grpc-core-*.jar' | wc -l)" != '0' ]] 21 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'grpc-android-*.aar' | wc -l)" != '0' ]] 24 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'protoc-gen-grpc-java-*-linux-x86_64.exe' | wc -l)… 25 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'protoc-gen-grpc-java-*-linux-x86_32.exe' | wc -l)… 28 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'protoc-gen-grpc-java-*-osx-x86_64.exe' | wc -l)" … 31 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'protoc-gen-grpc-java-*-windows-x86_64.exe' | wc -… 32 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'protoc-gen-grpc-java-*-windows-x86_32.exe' | wc -… [all …]
|
| /external/scapy/scapy/modules/krack/ |
| D | __init__.py | 11 passphrase="testtest", # Associated passphrase 15 passphrase. 19 - IV re-use!! Client seems to be vulnerable to handshake 3/4 replay 20 (CVE-2017-13077) 21 - Broadcast packet accepted twice!! (CVE-2017-13080) 22 - Client has installed an all zero encryption key (TK)!! 25 - Client is likely not vulnerable to CVE-2017-13080
|
| /external/ImageMagick/MagickCore/ |
| D | cipher.c | 19 % Copyright 1999-2021 ImageMagick Studio LLC, a non-profit organization % 45 #include "MagickCore/exception-private.h" 47 #include "MagickCore/image-private.h" 48 #include "MagickCore/linked-list.h" 51 #include "MagickCore/memory-private.h" 53 #include "MagickCore/monitor-private.h" 55 #include "MagickCore/quantum-private.h" 58 #include "MagickCore/signature-private.h" 59 #include "MagickCore/splay-tree.h" 196 aes_info->blocksize=AESBlocksize; in AcquireAESInfo() [all …]
|
| /external/python/pyopenssl/src/OpenSSL/ |
| D | crypto.py | 72 FILETYPE_TEXT = 2 ** 16 - 1 191 # - if timestamp was not an ASN1_TIME 192 # - if allocating memory for the ASN1_GENERALIZEDTIME failed 193 # - if a copy of the time data from timestamp cannot be made for 243 primitives/asymmetric/rsa/#key-interfaces 398 Implement cooperation with the right-hand side argument of ``!=``. 421 # we do? Abort the whole process, I suppose...? -exarkun 542 :ivar emailAddress: The e-mail address of the entity. 586 value = value.encode("utf-8") 589 self._name, nid, _lib.MBSTRING_UTF8, value, -1, -1, 0 [all …]
|
| /external/freetype/docs/ |
| D | release | 2 ---------------------------- 20 git clone -l -s . ../freetype.test 35 . Test C++ compilation for 'freetype-demos' too (using `git clone` as 42 'freetype-demos') with 44 git tag VER-<version> -m "" -u <committer> 48 git push --tags 52 git clean -ndx 57 . Say `make dist` in both the 'freetype' and 'freetype-demos' 60 . Create the doc bundles (`freetype-doc-<version>.tar.gz`, 61 `freetype-doc-<version>.tar.xz`, `ftdoc<version>.zip`). This is [all …]
|
| /external/e2fsprogs/misc/ |
| D | e4crypt.c | 2 * e4crypt.c - ext4 encryption management utility 54 #define KEY_SPEC_THREAD_KEYRING -1 55 #define KEY_SPEC_PROCESS_KEYRING -2 56 #define KEY_SPEC_SESSION_KEYRING -3 57 #define KEY_SPEC_USER_KEYRING -4 58 #define KEY_SPEC_USER_SESSION_KEYRING -5 59 #define KEY_SPEC_GROUP_KEYRING -6 162 return -EINVAL; in hex2byte() 166 return -EINVAL; in hex2byte() 169 return -EINVAL; in hex2byte() [all …]
|
| /external/f2fs-tools/tools/ |
| D | f2fscrypt.c | 2 * f2fscrypt.c - f2fs encryption management utility 79 #define KEY_SPEC_THREAD_KEYRING -1 80 #define KEY_SPEC_PROCESS_KEYRING -2 81 #define KEY_SPEC_SESSION_KEYRING -3 82 #define KEY_SPEC_USER_KEYRING -4 83 #define KEY_SPEC_USER_SESSION_KEYRING -5 84 #define KEY_SPEC_GROUP_KEYRING -6 208 return -EINVAL; in hex2byte() 212 return -EINVAL; in hex2byte() 215 return -EINVAL; in hex2byte() [all …]
|
| D | f2fscrypt.8 | 3 f2fscrypt \- f2fs filesystem encryption utility 5 .B f2fscrypt add_key -S \fR[\fB -k \fIkeyring\fR ] [\fB-v\fR] [\fB-q\fR] [ \fI path\fR ... ] 17 .B f2fscrypt add_key -S \fR[\fB -k \fIkeyring\fR ] [\fB-v\fR] [\fB-q\fR] [ \fI path\fR ... ] 18 Prompts the user for a passphrase and inserts it into the specified 46 # mkfs.f2fs -O encrypt /dev/sdxx 56 # f2fscrypt add_key -S 0x1234 57 Enter passphrase (echo disabled): 64 # ls -l /encrypted/dir/ 65 -rw-r--r--. 1 root root 0 Mar 5 21:41 test.txt 72 # ls -l /encrypted/dir/ [all …]
|
| /external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
| D | WifiAwareManagerFacade.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 114 private static final String NS_KEY_PASSPHRASE = "passphrase"; 132 if (ns.passphrase != null) { in getJsonString() 133 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString() 138 if (ns.transportProtocol != -1) { in getJsonString() 153 String passphrase = null; in getNetworkSpecifier() local 154 int port = 0, transportProtocol = -1; in getNetworkSpecifier() 178 passphrase = j.getString(NS_KEY_PASSPHRASE); in getNetworkSpecifier() 188 passphrase, port, transportProtocol); in getNetworkSpecifier() 367 @Rpc(description = "Does the device support the Wi-Fi Aware feature?") [all …]
|
| /external/autotest/client/common_lib/cros/network/ |
| D | xmlrpc_datatypes.py | 2 # Use of this source code is governed by a BSD-style license that can be 66 non-managed BSS. One of STATION_TYPE_* above. 114 def __init__(self, success=False, discovery_time=-1.0, 115 association_time=-1.0, configuration_time=-1.0, 178 DEFAULT_SIGNAL_THRESHOLD = -72 216 signal -= 95 + signal_noise 234 def __init__(self, guid, passphrase=None, autoconnect=None): argument 238 @param passphrase string optional psk passphrase. 246 self.passphrase = passphrase
|
| /external/wpa_supplicant_8/src/ap/ |
| D | ieee802_11_auth.c | 3 * Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi> 59 os_free(e->info.identity); in hostapd_acl_cache_free_entry() 60 os_free(e->info.radius_cui); in hostapd_acl_cache_free_entry() 61 hostapd_free_psk_list(e->info.psk); in hostapd_acl_cache_free_entry() 72 acl_cache = acl_cache->next; in hostapd_acl_cache_free() 86 for (entry = hapd->acl_cache; entry; entry = entry->next) { in hostapd_acl_cache_get() 87 if (os_memcmp(entry->addr, addr, ETH_ALEN) != 0) in hostapd_acl_cache_get() 90 if (os_reltime_expired(&now, &entry->timestamp, in hostapd_acl_cache_get() 92 return -1; /* entry has expired */ in hostapd_acl_cache_get() 93 *out = entry->info; in hostapd_acl_cache_get() [all …]
|
| /external/autotest/client/cros/enterprise/ |
| D | test_policy.py | 2 # Use of this source code is governed by a BSD-style license that can be 13 If you modify that file, you should be at minimum re-running this file. 20 autotest_lib.client.cros.enterprise.test_policy --debug 124 {'WiFi': {'Passphrase': 'Secret'}}]}} 133 {'WiFi': {'Passphrase': '********'}}]}} 147 {'WiFi': {'Passphrase': '********'}}]} 152 {'WiFi': {'Passphrase': 'Bad'}}]}
|
| /external/google-java-format/.github/workflows/ |
| D | release.yml | 1 name: Release google-java-format 11 build-maven-jars: 12 runs-on: ubuntu-latest 16 - name: Setup Signing Key 18 gpg-agent --daemon --default-cache-ttl 7200 19 echo -e "${{ secrets.GPG_SIGNING_KEY }}" | gpg --batch --import --no-tty 21 …gpg --detach-sig --yes -v --output=/dev/null --pinentry-mode loopback --passphrase "${{ secrets.GP… 23 gpg --list-secret-keys --keyid-format LONG 25 - name: Checkout 28 - name: Set up JDK [all …]
|