| /external/python/google-auth-library-python/google/auth/transport/ |
| D | _mtls_helper.py | 47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL 92 passphrase. 100 bytes in PEM format and passphrase bytes. 104 the cert provider command or generating cert, key and passphrase. 121 # Extract certificate (chain), key and passphrase. 132 raise exceptions.ClientCertError("Passphrase is missing or invalid") 140 raise exceptions.ClientCertError("Passphrase is not expected") 148 """Returns the client side certificate, private key and passphrase. 152 and passphrase will be generated; otherwise, unencrypted private key 153 will be generated and passphrase will be None. [all …]
|
| /external/wpa_supplicant_8/wpa_supplicant/ |
| D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 21 char *ssid, *passphrase, buf[64], *pos; in main() local 25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main() 26 "\nIf passphrase is left out, it will be read from " in main() 34 passphrase = argv[2]; in main() 38 fprintf(stderr, "# reading passphrase from stdin\n"); in main() 50 fprintf(stderr, "Failed to read passphrase\n"); in main() 67 passphrase = buf; in main() 70 len = os_strlen(passphrase); in main() 72 fprintf(stderr, "Passphrase must be 8..63 characters\n"); in main() [all …]
|
| /external/python/google-auth-library-python/tests/transport/ |
| D | test__mtls_helper.py | 42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable 44 -----END PASSPHRASE-----""" 160 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"]) 163 assert passphrase is None 166 pytest.public_cert_bytes + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b"" 168 cert, key, passphrase = _mtls_helper._run_cert_provider_command( 173 assert passphrase == PASSPHRASE_VALUE 181 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"]) 184 assert passphrase is None 187 PUBLIC_CERT_CHAIN_BYTES + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b"" [all …]
|
| /external/curl/tests/unit/ |
| D | unit1394.c | 47 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 82 char *certname, *passphrase; variable 84 parse_cert_parameter(p[0], &certname, &passphrase); 107 if(passphrase) { 108 if(strcmp(p[2], passphrase)) { 109 printf("expected passphrase '%s' but got '%s'" 110 "for -E param '%s'\n", p[2], passphrase, p[0]); 115 printf("expected passphrase '%s' but got NULL " 121 if(passphrase) { 122 printf("expected passphrase NULL but got '%s' " [all …]
|
| /external/wpa_supplicant_8/hostapd/ |
| D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
| /external/autotest/client/cros/scripts/ |
| D | wifi | 40 print(cmd, 'connect <ssid> [passphrase] [security]') 41 print(' |security| defaults to "psk" when |passphrase|', end=' ') 51 print(cmd, 'configure <ssid> [passphrase] [security]') 52 print(' |security| defaults to "psk" when |passphrase|', end=' ') 57 def configure(ssid, security, passphrase): argument 60 if passphrase is not None: 61 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 80 like the passphrase for psk security. 131 like the passphrase for psk security. 188 passphrase = None [all …]
|
| /external/wpa_supplicant_8/src/crypto/ |
| D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 62 * @passphrase: ASCII passphrase 74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
| /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
| D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para>
|
| /external/autotest/server/brillo/ |
| D | host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): argument 59 @param passphrase: A string representing the passphrase to the ssid. 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
| /external/openthread/tests/unit/ |
| D | test_pskc.cpp | 44 const char passphrase[] = "123456"; in TestMinimumPassphrase() local 46 SuccessOrQuit(ot::MeshCoP::GeneratePskc(passphrase, in TestMinimumPassphrase() 59 const char passphrase[] = "1234567812345678" in TestMaximumPassphrase() local 77 SuccessOrQuit(ot::MeshCoP::GeneratePskc(passphrase, in TestMaximumPassphrase() 90 const char passphrase[] = "12SECRETPASSWORD34"; in TestExampleInSpec() local 93 SuccessOrQuit(ot::MeshCoP::GeneratePskc(passphrase, in TestExampleInSpec()
|
| /external/ImageMagick/www/ |
| D | cipher.html | 97 …ermits you to scramble your images such that unless someone knows your passphrase, they will be un… 103 … is unrecognizable. The option requires a filename that contains your passphrase. In this exampl… 105 <pre class="highlight"><code>magick rose.jpg -encipher passphrase.txt rose.png 108 <p>Here we encipher an image using another image as the passphrase:</p> 115 …nizable once again. The option requires a filename that contains your passphrase. In this exampl… 117 <pre class="highlight"><code>magick rose.png -decipher passphrase.txt rose.jpg 131 <p>The passphrase can be any combinations of letters and symbols. It should 133 private. Also make sure your passphrase file permissions prevent others from 138 passphrase. If you lose or forget it, your original image content is lost 146 …passphrase to derive the nonce. The second half is the cipher key. When used correctly, AES-CTR p…
|
| /external/ImageMagick/www/api/ |
| D | cipher.html | 168 MagickBooleanType DecipherImage(Image *image,const char *passphrase, 183 <dt>passphrase</dt> 184 <dd>decipher cipher pixels with this passphrase. </dd> 205 MagickBooleanType EncipherImage(Image *image,const char *passphrase, 220 <dt>passphrase</dt> 221 <dd>encipher pixels with this passphrase. </dd> 268 MagickBooleanType DecipherImage(Image *image,const char *passphrase, 283 <dt>passphrase</dt> 284 <dd>decipher cipher pixels with this passphrase. </dd> 305 MagickBooleanType EncipherImage(Image *image,const char *passphrase, [all …]
|
| /external/rust/crates/openssl/src/ |
| D | macros.rs | 6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> { 10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable 14 passphrase.as_ptr() as *const _ as *mut _)) 58 passphrase: &[u8] 62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize); 66 passphrase.as_ptr() as *const _ as *mut _, 67 passphrase.len() as ::libc::c_int,
|
| /external/scapy/scapy/modules/krack/ |
| D | __init__.py | 11 passphrase="testtest", # Associated passphrase 15 passphrase.
|
| /external/robolectric/shadows/framework/src/main/java/org/robolectric/shadows/ |
| D | ShadowWifiP2pGroup.java | 23 public void setPassphrase(String passphrase) { in setPassphrase() argument 24 reflector(WifiP2pGroupReflector.class, realObject).setInterface(passphrase); in setPassphrase() 39 void setPassphrase(String passphrase); in setPassphrase() argument
|
| /external/grpc-grpc-java/buildscripts/kokoro/ |
| D | upload_artifacts.sh | 50 bash -c 'cat ~/java_signing/passphrase | gpg --batch --passphrase-fd 0 --detach-sign -a {}' \; 58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
|
| /external/ImageMagick/MagickCore/ |
| D | cipher.c | 508 % MagickBooleanType DecipherImage(Image *image,const char *passphrase, 515 % o passphrase: decipher cipher pixels with this passphrase. 539 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 547 if (passphrase == (const char *) NULL) in DecipherImage() 549 passkey=StringToStringInfo(passphrase); in DecipherImage() 733 % MagickBooleanType EncipherImage(Image *image,const char *passphrase, 740 % o passphrase: encipher pixels with this passphrase. 749 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 757 if (passphrase == (const char *) NULL) in EncipherImage() 759 passkey=StringToStringInfo(passphrase); in EncipherImage() [all …]
|
| /external/ot-br-posix/tools/ |
| D | pskc.cpp | 55 " pskc <PASSPHRASE> <EXTPANID> <NETWORK_NAME>\n" in help() 70 VerifyOrExit(length > 0, printf("PASSPHRASE must not be empty.\n")); in printPSKc() 72 printf("PASSPHRASE Passphrase must be no more than %d bytes.\n", kMaxPassphrase)); in printPSKc()
|
| /external/freetype/docs/ |
| D | release | 106 unset passphrase 108 PATH=/empty echo -n "Enter GPG passphrase: " 110 read -r passphrase 126 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
|
| /external/autotest/client/common_lib/cros/network/ |
| D | xmlrpc_datatypes.py | 235 def __init__(self, guid, passphrase=None, autoconnect=None): argument 239 @param passphrase string optional psk passphrase. 247 self.passphrase = passphrase
|
| /external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
| D | WifiAwareManagerFacade.java | 114 private static final String NS_KEY_PASSPHRASE = "passphrase"; 132 if (ns.passphrase != null) { in getJsonString() 133 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString() 153 String passphrase = null; in getNetworkSpecifier() local 178 passphrase = j.getString(NS_KEY_PASSPHRASE); in getNetworkSpecifier() 188 passphrase, port, transportProtocol); in getNetworkSpecifier() 591 @RpcParameter(name = "passphrase", in wifiAwareCreateNetworkSpecifier() 592 description = "Passphrase of the data-path. Optional, can be empty/null.") in wifiAwareCreateNetworkSpecifier() 593 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifier() argument 629 passphrase, in wifiAwareCreateNetworkSpecifier() [all …]
|
| /external/e2fsprogs/misc/ |
| D | e4crypt.c | 406 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 410 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 422 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512() 434 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 436 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 443 * buf: [previous hash || passphrase] in pbkdf2_sha512() 469 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 476 p = fgets(passphrase, len, stdin); in get_passphrase() 483 p = strrchr(passphrase, '\n'); in get_passphrase() 485 p = passphrase + len - 1; in get_passphrase() [all …]
|
| /external/f2fs-tools/tools/ |
| D | f2fscrypt.c | 464 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 468 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 480 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512() 492 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 494 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 501 * buf: [previous hash || passphrase] in pbkdf2_sha512() 527 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 534 p = fgets(passphrase, len, stdin); in get_passphrase() 541 p = strrchr(passphrase, '\n'); in get_passphrase() 543 p = passphrase + len - 1; in get_passphrase() [all …]
|
| D | f2fscrypt.8 | 18 Prompts the user for a passphrase and inserts it into the specified 57 Enter passphrase (echo disabled): 79 Enter passphrase (echo disabled):
|
| /external/autotest/client/cros/enterprise/ |
| D | test_policy.py | 124 {'WiFi': {'Passphrase': 'Secret'}}]}} 133 {'WiFi': {'Passphrase': '********'}}]}} 147 {'WiFi': {'Passphrase': '********'}}]} 152 {'WiFi': {'Passphrase': 'Bad'}}]}
|