Home
last modified time | relevance | path

Searched full:passphrase (Results 1 – 25 of 243) sorted by relevance

12345678910

/external/python/google-auth-library-python/google/auth/transport/
D_mtls_helper.py47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL
92 passphrase.
100 bytes in PEM format and passphrase bytes.
104 the cert provider command or generating cert, key and passphrase.
121 # Extract certificate (chain), key and passphrase.
132 raise exceptions.ClientCertError("Passphrase is missing or invalid")
140 raise exceptions.ClientCertError("Passphrase is not expected")
148 """Returns the client side certificate, private key and passphrase.
152 and passphrase will be generated; otherwise, unencrypted private key
153 will be generated and passphrase will be None.
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
21 char *ssid, *passphrase, buf[64], *pos; in main() local
25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main()
26 "\nIf passphrase is left out, it will be read from " in main()
34 passphrase = argv[2]; in main()
38 fprintf(stderr, "# reading passphrase from stdin\n"); in main()
50 fprintf(stderr, "Failed to read passphrase\n"); in main()
67 passphrase = buf; in main()
70 len = os_strlen(passphrase); in main()
72 fprintf(stderr, "Passphrase must be 8..63 characters\n"); in main()
[all …]
/external/python/google-auth-library-python/tests/transport/
Dtest__mtls_helper.py42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable
44 -----END PASSPHRASE-----"""
160 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"])
163 assert passphrase is None
166 pytest.public_cert_bytes + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b""
168 cert, key, passphrase = _mtls_helper._run_cert_provider_command(
173 assert passphrase == PASSPHRASE_VALUE
181 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"])
184 assert passphrase is None
187 PUBLIC_CERT_CHAIN_BYTES + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b""
[all …]
/external/curl/tests/unit/
Dunit1394.c47 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
82 char *certname, *passphrase; variable
84 parse_cert_parameter(p[0], &certname, &passphrase);
107 if(passphrase) {
108 if(strcmp(p[2], passphrase)) {
109 printf("expected passphrase '%s' but got '%s'"
110 "for -E param '%s'\n", p[2], passphrase, p[0]);
115 printf("expected passphrase '%s' but got NULL "
121 if(passphrase) {
122 printf("expected passphrase NULL but got '%s' "
[all …]
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
/external/autotest/client/cros/scripts/
Dwifi40 print(cmd, 'connect <ssid> [passphrase] [security]')
41 print(' |security| defaults to "psk" when |passphrase|', end=' ')
51 print(cmd, 'configure <ssid> [passphrase] [security]')
52 print(' |security| defaults to "psk" when |passphrase|', end=' ')
57 def configure(ssid, security, passphrase): argument
60 if passphrase is not None:
61 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
80 like the passphrase for psk security.
131 like the passphrase for psk security.
188 passphrase = None
[all …]
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
62 * @passphrase: ASCII passphrase
74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
/external/autotest/server/brillo/
Dhost_utils.py53 def connect_to_ssid(host, ssid, passphrase): argument
59 @param passphrase: A string representing the passphrase to the ssid.
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
/external/openthread/tests/unit/
Dtest_pskc.cpp44 const char passphrase[] = "123456"; in TestMinimumPassphrase() local
46 SuccessOrQuit(ot::MeshCoP::GeneratePskc(passphrase, in TestMinimumPassphrase()
59 const char passphrase[] = "1234567812345678" in TestMaximumPassphrase() local
77 SuccessOrQuit(ot::MeshCoP::GeneratePskc(passphrase, in TestMaximumPassphrase()
90 const char passphrase[] = "12SECRETPASSWORD34"; in TestExampleInSpec() local
93 SuccessOrQuit(ot::MeshCoP::GeneratePskc(passphrase, in TestExampleInSpec()
/external/ImageMagick/www/
Dcipher.html97 …ermits you to scramble your images such that unless someone knows your passphrase, they will be un…
103 … is unrecognizable. The option requires a filename that contains your passphrase. In this exampl…
105 <pre class="highlight"><code>magick rose.jpg -encipher passphrase.txt rose.png
108 <p>Here we encipher an image using another image as the passphrase:</p>
115 …nizable once again. The option requires a filename that contains your passphrase. In this exampl…
117 <pre class="highlight"><code>magick rose.png -decipher passphrase.txt rose.jpg
131 <p>The passphrase can be any combinations of letters and symbols. It should
133 private. Also make sure your passphrase file permissions prevent others from
138 passphrase. If you lose or forget it, your original image content is lost
146passphrase to derive the nonce. The second half is the cipher key. When used correctly, AES-CTR p…
/external/ImageMagick/www/api/
Dcipher.html168 MagickBooleanType DecipherImage(Image *image,const char *passphrase,
183 <dt>passphrase</dt>
184 <dd>decipher cipher pixels with this passphrase. </dd>
205 MagickBooleanType EncipherImage(Image *image,const char *passphrase,
220 <dt>passphrase</dt>
221 <dd>encipher pixels with this passphrase. </dd>
268 MagickBooleanType DecipherImage(Image *image,const char *passphrase,
283 <dt>passphrase</dt>
284 <dd>decipher cipher pixels with this passphrase. </dd>
305 MagickBooleanType EncipherImage(Image *image,const char *passphrase,
[all …]
/external/rust/crates/openssl/src/
Dmacros.rs6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> {
10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable
14 passphrase.as_ptr() as *const _ as *mut _))
58 passphrase: &[u8]
62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize);
66 passphrase.as_ptr() as *const _ as *mut _,
67 passphrase.len() as ::libc::c_int,
/external/scapy/scapy/modules/krack/
D__init__.py11 passphrase="testtest", # Associated passphrase
15 passphrase.
/external/robolectric/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowWifiP2pGroup.java23 public void setPassphrase(String passphrase) { in setPassphrase() argument
24 reflector(WifiP2pGroupReflector.class, realObject).setInterface(passphrase); in setPassphrase()
39 void setPassphrase(String passphrase); in setPassphrase() argument
/external/grpc-grpc-java/buildscripts/kokoro/
Dupload_artifacts.sh50 bash -c 'cat ~/java_signing/passphrase | gpg --batch --passphrase-fd 0 --detach-sign -a {}' \;
58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
/external/ImageMagick/MagickCore/
Dcipher.c508 % MagickBooleanType DecipherImage(Image *image,const char *passphrase,
515 % o passphrase: decipher cipher pixels with this passphrase.
539 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
547 if (passphrase == (const char *) NULL) in DecipherImage()
549 passkey=StringToStringInfo(passphrase); in DecipherImage()
733 % MagickBooleanType EncipherImage(Image *image,const char *passphrase,
740 % o passphrase: encipher pixels with this passphrase.
749 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
757 if (passphrase == (const char *) NULL) in EncipherImage()
759 passkey=StringToStringInfo(passphrase); in EncipherImage()
[all …]
/external/ot-br-posix/tools/
Dpskc.cpp55 " pskc <PASSPHRASE> <EXTPANID> <NETWORK_NAME>\n" in help()
70 VerifyOrExit(length > 0, printf("PASSPHRASE must not be empty.\n")); in printPSKc()
72 printf("PASSPHRASE Passphrase must be no more than %d bytes.\n", kMaxPassphrase)); in printPSKc()
/external/freetype/docs/
Drelease106 unset passphrase
108 PATH=/empty echo -n "Enter GPG passphrase: "
110 read -r passphrase
126 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_datatypes.py235 def __init__(self, guid, passphrase=None, autoconnect=None): argument
239 @param passphrase string optional psk passphrase.
247 self.passphrase = passphrase
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
DWifiAwareManagerFacade.java114 private static final String NS_KEY_PASSPHRASE = "passphrase";
132 if (ns.passphrase != null) { in getJsonString()
133 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString()
153 String passphrase = null; in getNetworkSpecifier() local
178 passphrase = j.getString(NS_KEY_PASSPHRASE); in getNetworkSpecifier()
188 passphrase, port, transportProtocol); in getNetworkSpecifier()
591 @RpcParameter(name = "passphrase", in wifiAwareCreateNetworkSpecifier()
592 description = "Passphrase of the data-path. Optional, can be empty/null.") in wifiAwareCreateNetworkSpecifier()
593 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifier() argument
629 passphrase, in wifiAwareCreateNetworkSpecifier()
[all …]
/external/e2fsprogs/misc/
De4crypt.c406 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
410 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
422 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512()
434 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
436 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
443 * buf: [previous hash || passphrase] in pbkdf2_sha512()
469 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
476 p = fgets(passphrase, len, stdin); in get_passphrase()
483 p = strrchr(passphrase, '\n'); in get_passphrase()
485 p = passphrase + len - 1; in get_passphrase()
[all …]
/external/f2fs-tools/tools/
Df2fscrypt.c464 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
468 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
480 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512()
492 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
494 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
501 * buf: [previous hash || passphrase] in pbkdf2_sha512()
527 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
534 p = fgets(passphrase, len, stdin); in get_passphrase()
541 p = strrchr(passphrase, '\n'); in get_passphrase()
543 p = passphrase + len - 1; in get_passphrase()
[all …]
Df2fscrypt.818 Prompts the user for a passphrase and inserts it into the specified
57 Enter passphrase (echo disabled):
79 Enter passphrase (echo disabled):
/external/autotest/client/cros/enterprise/
Dtest_policy.py124 {'WiFi': {'Passphrase': 'Secret'}}]}}
133 {'WiFi': {'Passphrase': '********'}}]}}
147 {'WiFi': {'Passphrase': '********'}}]}
152 {'WiFi': {'Passphrase': 'Bad'}}]}

12345678910