Home
last modified time | relevance | path

Searched +full:- +full:- +full:passphrase (Results 1 – 25 of 251) sorted by relevance

1234567891011

/external/python/google-auth-library-python/google/auth/transport/
D_mtls_helper.py7 # http://www.apache.org/licenses/LICENSE-2.0
30 b"-----BEGIN CERTIFICATE-----.+-----END CERTIFICATE-----\r?\n?", re.DOTALL
34 # "-----BEGIN PRIVATE KEY-----...",
35 # "-----BEGIN EC PRIVATE KEY-----...",
36 # "-----BEGIN RSA PRIVATE KEY-----..."
37 # "-----BEGIN ENCRYPTED PRIVATE KEY-----"
39 b"-----BEGIN [A-Z ]*PRIVATE KEY-----.+-----END [A-Z ]*PRIVATE KEY-----\r?\n?",
47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL
92 passphrase.
100 bytes in PEM format and passphrase bytes.
[all …]
/external/python/google-auth-library-python/tests/transport/
Dtest__mtls_helper.py7 # http://www.apache.org/licenses/LICENSE-2.0
29 ENCRYPTED_EC_PRIVATE_KEY = b"""-----BEGIN ENCRYPTED PRIVATE KEY-----
35 -----END ENCRYPTED PRIVATE KEY-----"""
37 EC_PUBLIC_KEY = b"""-----BEGIN PUBLIC KEY-----
40 -----END PUBLIC KEY-----"""
42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable
44 -----END PASSPHRASE-----"""
92 KEY = b"""-----BEGIN PRIVATE KEY-----
95 -----END PRIVATE KEY-----"""
96 RSA_KEY = b"""-----BEGIN RSA PRIVATE KEY-----
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
3 * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
21 char *ssid, *passphrase, buf[64], *pos; in main() local
25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main()
26 "\nIf passphrase is left out, it will be read from " in main()
34 passphrase = argv[2]; in main()
38 fprintf(stderr, "# reading passphrase from stdin\n"); in main()
50 fprintf(stderr, "Failed to read passphrase\n"); in main()
58 buf[sizeof(buf) - 1] = '\0'; in main()
67 passphrase = buf; in main()
[all …]
Dconfig_ssid.h3 * Copyright (c) 2003-2013, Jouni Malinen <j@w1.fi>
16 #define DEFAULT_EAP_WORKAROUND ((unsigned int) -1)
30 #define DEFAULT_BG_SCAN_PERIOD -1
40 #define DEFAULT_TX_STBC -1 /* no change */
41 #define DEFAULT_RX_STBC -1 /* no change */
42 #define DEFAULT_DISABLE_MAX_AMSDU -1 /* no change */
43 #define DEFAULT_AMPDU_FACTOR -1 /* no change */
44 #define DEFAULT_AMPDU_DENSITY -1 /* no change */
46 #define DEFAULT_MAX_OPER_CHWIDTH -1
74 WPAS_MAC_ADDR_STYLE_NOT_SET = -1,
[all …]
/external/curl/tests/unit/
Dunit1394.c21 * SPDX-License-Identifier: curl
47 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
82 char *certname, *passphrase; variable
84 parse_cert_parameter(p[0], &certname, &passphrase);
89 "for -E param '%s'\n", p[1], certname, p[0]);
95 "for -E param '%s'\n", p[1], p[0]);
102 "for -E param '%s'\n", certname, p[0]);
107 if(passphrase) {
108 if(strcmp(p[2], passphrase)) {
109 printf("expected passphrase '%s' but got '%s'"
[all …]
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
5 # characters or as a 256-bit hex PSK (64 hex digits).
13 # per-Enrollee PSK.
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c2 * SHA1-based key derivation function (PBKDF2) for IEEE 802.11i
3 * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
33 * Uc = PRF(P, Uc-1) in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
42 return -1; in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
48 return -1; in pbkdf2_sha1_f()
61 * pbkdf2_sha1 - SHA1-based key derivation function (PBKDF2) for IEEE 802.11i
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml1 <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN">
14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
27 <para><command>wpa_passphrase</command> pre-computes PSK entries for
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
30 and SSID are used to generate a 256-bit PSK.</para>
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
[all …]
/external/autotest/client/cros/scripts/
Dwifi4 # Use of this source code is governed by a BSD-style license that can be
40 print(cmd, 'connect <ssid> [passphrase] [security]')
41 print(' |security| defaults to "psk" when |passphrase|', end=' ')
51 print(cmd, 'configure <ssid> [passphrase] [security]')
52 print(' |security| defaults to "psk" when |passphrase|', end=' ')
57 def configure(ssid, security, passphrase): argument
60 if passphrase is not None:
61 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
80 like the passphrase for psk security.
131 like the passphrase for psk security.
[all …]
/external/autotest/server/brillo/
Dhost_utils.py2 # Use of this source code is governed by a BSD-style license that can be
14 _RUN_BACKGROUND_TEMPLATE = '( %(cmd)s ) </dev/null >/dev/null 2>&1 & echo -n $!'
18 while test ${to} -ne 0; do \
19 test $(ps %(pid)d | wc -l) -gt 1 || break; \
21 to=$((to - 1)); \
23 test ${to} -ne 0 -o $(ps %(pid)d | wc -l) -eq 1 \
39 def wait_for_process(host, pid, timeout=-1):
53 def connect_to_ssid(host, ssid, passphrase): argument
59 @param passphrase: A string representing the passphrase to the ssid.
75 'service weaved \/system\/bin\/weaved --disable_privet/\' '
[all …]
/external/google-auth-library-java/
DRELEASE.md1 One-time setup
5 -----------------------
10 ------------------------
12 …h rights by creating an issue similar to [this one](https://issues.sonatype.org/browse/OSSRH-16798)
17 ---------------
22 * Generate the key ```gpg --gen-key```
24 * Keep the defaults, but specify a passphrase
25 * The passphrase can be random; you just need to remember it long enough to finish the next step
26 * One way to make a random passphrase: ```base64 /dev/urandom | head -c20; echo;```
28 * Find the ID of your public key ```gpg --list-secret-keys```
[all …]
/external/rust/crates/openssl/src/
Dmacros.rs6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> {
10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable
14 passphrase.as_ptr() as *const _ as *mut _))
20 pub fn $n3<F>(pem: &[u8], callback: F) -> Result<$t, crate::error::ErrorStack>
21 where F: FnOnce(&mut [u8]) -> Result<usize, crate::error::ErrorStack>
40 pub fn $n(&self) -> Result<Vec<u8>, crate::error::ErrorStack> {
47 -1,
58 passphrase: &[u8]
59 ) -> Result<Vec<u8>, crate::error::ErrorStack> {
62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize);
[all …]
/external/scapy/scapy/modules/krack/
D__init__.py11 passphrase="testtest", # Associated passphrase
15 passphrase.
19 - IV re-use!! Client seems to be vulnerable to handshake 3/4 replay
20 (CVE-2017-13077)
21 - Broadcast packet accepted twice!! (CVE-2017-13080)
22 - Client has installed an all zero encryption key (TK)!!
25 - Client is likely not vulnerable to CVE-2017-13080
/external/ot-br-posix/tools/
Dpskc.cpp2 * Copyright (c) 2017-2018, The OpenThread Authors.
53 printf("pskc - compute PSKc\n" in help()
55 " pskc <PASSPHRASE> <EXTPANID> <NETWORK_NAME>\n" in help()
64 int ret = -1; in printPSKc()
70 VerifyOrExit(length > 0, printf("PASSPHRASE must not be empty.\n")); in printPSKc()
72 printf("PASSPHRASE Passphrase must be no more than %d bytes.\n", kMaxPassphrase)); in printPSKc()
/external/freetype/docs/
Drelease2 ----------------------------
36 to test compilation with both gcc and g++ (you might also add the `-j`
44 . Test C++ compilation for 'freetype-demos' too; this needs a compiled
54 'freetype-demos' git repositories) with
58 . Test meson compilation (for both the 'freetype' and 'freetype-demos'
61 meson setup builddir && meson compile -C builddir
66 'freetype-demos') with
68 git tag VER-<version> -m "" -u <committer>
72 git push --tags
76 git clean -ndx
[all …]
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_datatypes.py3 # Use of this source code is governed by a BSD-style license that can be
67 non-managed BSS. One of STATION_TYPE_* above.
115 def __init__(self, success=False, discovery_time=-1.0,
116 association_time=-1.0, configuration_time=-1.0,
179 DEFAULT_SIGNAL_THRESHOLD = -72
217 signal -= 95 + signal_noise
235 def __init__(self, guid, passphrase=None, autoconnect=None): argument
239 @param passphrase string optional psk passphrase.
247 self.passphrase = passphrase
/external/e2fsprogs/misc/
De4crypt.c2 * e4crypt.c - ext4 encryption management utility
54 #define KEY_SPEC_THREAD_KEYRING -1
55 #define KEY_SPEC_PROCESS_KEYRING -2
56 #define KEY_SPEC_SESSION_KEYRING -3
57 #define KEY_SPEC_USER_KEYRING -4
58 #define KEY_SPEC_USER_SESSION_KEYRING -5
59 #define KEY_SPEC_GROUP_KEYRING -6
162 return -EINVAL; in hex2byte()
166 return -EINVAL; in hex2byte()
169 return -EINVAL; in hex2byte()
[all …]
/external/f2fs-tools/tools/
Df2fscrypt.c2 * f2fscrypt.c - f2fs encryption management utility
75 #define KEY_SPEC_THREAD_KEYRING -1
76 #define KEY_SPEC_PROCESS_KEYRING -2
77 #define KEY_SPEC_SESSION_KEYRING -3
78 #define KEY_SPEC_USER_KEYRING -4
79 #define KEY_SPEC_USER_SESSION_KEYRING -5
80 #define KEY_SPEC_GROUP_KEYRING -6
208 return -EINVAL; in hex2byte()
212 return -EINVAL; in hex2byte()
215 return -EINVAL; in hex2byte()
[all …]
Df2fscrypt.83 f2fscrypt \- f2fs filesystem encryption utility
5 .B f2fscrypt add_key -S \fR[\fB -k \fIkeyring\fR ] [\fB-v\fR] [\fB-q\fR] [ \fI path\fR ... ]
17 .B f2fscrypt add_key -S \fR[\fB -k \fIkeyring\fR ] [\fB-v\fR] [\fB-q\fR] [ \fI path\fR ... ]
18 Prompts the user for a passphrase and inserts it into the specified
46 # mkfs.f2fs -O encrypt /dev/sdxx
56 # f2fscrypt add_key -S 0x1234
57 Enter passphrase (echo disabled):
64 # ls -l /encrypted/dir/
65 -rw-r--r--. 1 root root 0 Mar 5 21:41 test.txt
72 # ls -l /encrypted/dir/
[all …]
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
DWifiAwareManagerFacade.java8 * http://www.apache.org/licenses/LICENSE-2.0
114 private static final String NS_KEY_PASSPHRASE = "passphrase";
132 if (ns.passphrase != null) { in getJsonString()
133 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString()
138 if (ns.transportProtocol != -1) { in getJsonString()
153 String passphrase = null; in getNetworkSpecifier() local
154 int port = 0, transportProtocol = -1; in getNetworkSpecifier()
178 passphrase = j.getString(NS_KEY_PASSPHRASE); in getNetworkSpecifier()
188 passphrase, port, transportProtocol); in getNetworkSpecifier()
367 @Rpc(description = "Does the device support the Wi-Fi Aware feature?")
[all …]
/external/grpc-grpc-java/buildscripts/kokoro/
Dupload_artifacts.sh2 set -veux -o pipefail
4 if [[ -f /VERSION ]]; then
14 LOCAL_MVN_ARTIFACTS="$KOKORO_GFILE_DIR"/github/grpc-java/mvn-artifacts/
15 LOCAL_OTHER_ARTIFACTS="$KOKORO_GFILE_DIR"/github/grpc-java/artifacts/
19 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'grpc-core-*.jar' | wc -l)" != '0' ]]
22 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'grpc-android-*.aar' | wc -l)" != '0' ]]
25 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'grpc-cronet-*.aar' | wc -l)" != '0' ]]
28 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'grpc-binder-*.aar' | wc -l)" != '0' ]]
31 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'protoc-gen-grpc-java-*-linux-x86_64.exe' | wc -l)…
32 [[ "$(find "$LOCAL_MVN_ARTIFACTS" -type f -iname 'protoc-gen-grpc-java-*-linux-x86_32.exe' | wc -l)…
[all …]
/external/autotest/client/cros/enterprise/
Dtest_policy.py2 # Use of this source code is governed by a BSD-style license that can be
13 If you modify that file, you should be at minimum re-running this file.
20 autotest_lib.client.cros.enterprise.test_policy --debug
124 {'WiFi': {'Passphrase': 'Secret'}}]}}
133 {'WiFi': {'Passphrase': '********'}}]}}
147 {'WiFi': {'Passphrase': '********'}}]}
152 {'WiFi': {'Passphrase': 'Bad'}}]}
/external/google-java-format/.github/workflows/
Drelease.yml1 name: Release google-java-format
11 build-maven-jars:
12 runs-on: ubuntu-latest
16 - name: Checkout
19 - name: Set up JDK
20 uses: actions/setup-java@v2.5.0
22 java-version: 17
25 server-id: sonatype-nexus-staging
26 server-username: CI_DEPLOY_USERNAME
27 server-password: CI_DEPLOY_PASSWORD
[all …]
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c3 * Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi>
59 os_free(e->info.identity); in hostapd_acl_cache_free_entry()
60 os_free(e->info.radius_cui); in hostapd_acl_cache_free_entry()
61 hostapd_free_psk_list(e->info.psk); in hostapd_acl_cache_free_entry()
72 acl_cache = acl_cache->next; in hostapd_acl_cache_free()
86 for (entry = hapd->acl_cache; entry; entry = entry->next) { in hostapd_acl_cache_get()
87 if (os_memcmp(entry->addr, addr, ETH_ALEN) != 0) in hostapd_acl_cache_get()
90 if (os_reltime_expired(&now, &entry->timestamp, in hostapd_acl_cache_get()
92 return -1; /* entry has expired */ in hostapd_acl_cache_get()
93 *out = entry->info; in hostapd_acl_cache_get()
[all …]
/external/aws-sdk-java-v2/buildspecs/resources/
Drelease-settings.xml4 <id>sonatype-nexus-staging</id>
17 <gpg.passphrase>$SDK_SIGNING_GPG_PASSPHRASE</gpg.passphrase>

1234567891011