| /external/python/google-auth-library-python/google/auth/transport/ |
| D | _mtls_helper.py | 47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL 92 passphrase. 100 bytes in PEM format and passphrase bytes. 104 the cert provider command or generating cert, key and passphrase. 121 # Extract certificate (chain), key and passphrase. 132 raise exceptions.ClientCertError("Passphrase is missing or invalid") 140 raise exceptions.ClientCertError("Passphrase is not expected") 148 """Returns the client side certificate, private key and passphrase. 152 and passphrase will be generated; otherwise, unencrypted private key 153 will be generated and passphrase will be None. [all …]
|
| /external/wpa_supplicant_8/wpa_supplicant/ |
| D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 21 char *ssid, *passphrase, buf[64], *pos; in main() local 25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main() 26 "\nIf passphrase is left out, it will be read from " in main() 34 passphrase = argv[2]; in main() 38 fprintf(stderr, "# reading passphrase from stdin\n"); in main() 50 fprintf(stderr, "Failed to read passphrase\n"); in main() 67 passphrase = buf; in main() 70 len = os_strlen(passphrase); in main() 72 fprintf(stderr, "Passphrase must be 8..63 characters\n"); in main() [all …]
|
| /external/python/google-auth-library-python/tests/transport/ |
| D | test__mtls_helper.py | 42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable 44 -----END PASSPHRASE-----""" 160 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"]) 163 assert passphrase is None 166 pytest.public_cert_bytes + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b"" 168 cert, key, passphrase = _mtls_helper._run_cert_provider_command( 173 assert passphrase == PASSPHRASE_VALUE 181 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"]) 184 assert passphrase is None 187 PUBLIC_CERT_CHAIN_BYTES + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b"" [all …]
|
| /external/curl/tests/unit/ |
| D | unit1394.c | 47 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 82 char *certname, *passphrase; variable 84 parse_cert_parameter(p[0], &certname, &passphrase); 107 if(passphrase) { 108 if(strcmp(p[2], passphrase)) { 109 printf("expected passphrase '%s' but got '%s'" 110 "for -E param '%s'\n", p[2], passphrase, p[0]); 115 printf("expected passphrase '%s' but got NULL " 121 if(passphrase) { 122 printf("expected passphrase NULL but got '%s' " [all …]
|
| /external/wpa_supplicant_8/hostapd/ |
| D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
| D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
| /external/autotest/client/cros/scripts/ |
| D | wifi | 40 print(cmd, 'connect <ssid> [passphrase] [security]') 41 print(' |security| defaults to "psk" when |passphrase|', end=' ') 51 print(cmd, 'configure <ssid> [passphrase] [security]') 52 print(' |security| defaults to "psk" when |passphrase|', end=' ') 57 def configure(ssid, security, passphrase): argument 60 if passphrase is not None: 61 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 80 like the passphrase for psk security. 131 like the passphrase for psk security. 188 passphrase = None [all …]
|
| /external/wpa_supplicant_8/src/crypto/ |
| D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 62 * @passphrase: ASCII passphrase 74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
| /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
| D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para>
|
| /external/autotest/server/brillo/ |
| D | host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): argument 59 @param passphrase: A string representing the passphrase to the ssid. 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
| /external/google-auth-library-java/ |
| D | RELEASE.md | 24 * Keep the defaults, but specify a passphrase 25 * The passphrase can be random; you just need to remember it long enough to finish the next step 26 * One way to make a random passphrase: ```base64 /dev/urandom | head -c20; echo;``` 37 * Create a file at ```$HOME/.m2/settings.xml``` with your passphrase and your sonatype username and… 48 <gpg.passphrase>[the password for your gpg key]</gpg.passphrase>
|
| /external/rust/crates/openssl/src/ |
| D | macros.rs | 6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> { 10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable 14 passphrase.as_ptr() as *const _ as *mut _)) 58 passphrase: &[u8] 62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize); 66 passphrase.as_ptr() as *const _ as *mut _, 67 passphrase.len() as ::libc::c_int,
|
| /external/robolectric/shadows/framework/src/main/java/org/robolectric/shadows/ |
| D | ShadowWifiP2pGroup.java | 23 public void setPassphrase(String passphrase) { in setPassphrase() argument 24 reflector(WifiP2pGroupReflector.class, realObject).setInterface(passphrase); in setPassphrase() 39 void setPassphrase(String passphrase); in setPassphrase() argument
|
| /external/scapy/scapy/modules/krack/ |
| D | __init__.py | 11 passphrase="testtest", # Associated passphrase 15 passphrase.
|
| /external/ot-br-posix/tools/ |
| D | pskc.cpp | 55 " pskc <PASSPHRASE> <EXTPANID> <NETWORK_NAME>\n" in help() 70 VerifyOrExit(length > 0, printf("PASSPHRASE must not be empty.\n")); in printPSKc() 72 printf("PASSPHRASE Passphrase must be no more than %d bytes.\n", kMaxPassphrase)); in printPSKc()
|
| /external/autotest/client/common_lib/cros/network/ |
| D | xmlrpc_datatypes.py | 235 def __init__(self, guid, passphrase=None, autoconnect=None): argument 239 @param passphrase string optional psk passphrase. 247 self.passphrase = passphrase
|
| /external/freetype/docs/ |
| D | release | 126 unset passphrase 128 PATH=/empty echo -n "Enter GPG passphrase: " 130 read -r passphrase 146 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
|
| /external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
| D | WifiAwareManagerFacade.java | 114 private static final String NS_KEY_PASSPHRASE = "passphrase"; 132 if (ns.passphrase != null) { in getJsonString() 133 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString() 153 String passphrase = null; in getNetworkSpecifier() local 178 passphrase = j.getString(NS_KEY_PASSPHRASE); in getNetworkSpecifier() 188 passphrase, port, transportProtocol); in getNetworkSpecifier() 591 @RpcParameter(name = "passphrase", in wifiAwareCreateNetworkSpecifier() 592 description = "Passphrase of the data-path. Optional, can be empty/null.") in wifiAwareCreateNetworkSpecifier() 593 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifier() argument 629 passphrase, in wifiAwareCreateNetworkSpecifier() [all …]
|
| /external/f2fs-tools/tools/ |
| D | f2fscrypt.c | 455 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 459 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 471 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512() 483 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 485 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 492 * buf: [previous hash || passphrase] in pbkdf2_sha512() 518 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 525 p = fgets(passphrase, len, stdin); in get_passphrase() 532 p = strrchr(passphrase, '\n'); in get_passphrase() 534 p = passphrase + len - 1; in get_passphrase() [all …]
|
| D | f2fscrypt.8 | 18 Prompts the user for a passphrase and inserts it into the specified 57 Enter passphrase (echo disabled): 79 Enter passphrase (echo disabled):
|
| /external/e2fsprogs/misc/ |
| D | e4crypt.c | 406 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 410 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 422 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512() 434 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 436 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 443 * buf: [previous hash || passphrase] in pbkdf2_sha512() 469 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 476 p = fgets(passphrase, len, stdin); in get_passphrase() 483 p = strrchr(passphrase, '\n'); in get_passphrase() 485 p = passphrase + len - 1; in get_passphrase() [all …]
|
| /external/autotest/client/cros/enterprise/ |
| D | test_policy.py | 124 {'WiFi': {'Passphrase': 'Secret'}}]}} 133 {'WiFi': {'Passphrase': '********'}}]}} 147 {'WiFi': {'Passphrase': '********'}}]} 152 {'WiFi': {'Passphrase': 'Bad'}}]}
|
| /external/grpc-grpc-java/buildscripts/kokoro/ |
| D | upload_artifacts.sh | 71 bash -c 'cat ~/java_signing/passphrase | gpg --batch --passphrase-fd 0 --detach-sign -a {}' \; 79 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
|
| /external/google-java-format/.github/workflows/ |
| D | release.yml | 29 gpg-passphrase: MAVEN_GPG_PASSPHRASE 50 …gress -pl '!eclipse_plugin' -P sonatype-oss-release clean deploy -Dgpg.passphrase="${{ secrets.GPG… 54 …r-progress -pl 'eclipse_plugin' verify gpg:sign -DskipTests=true -Dgpg.passphrase="${{ secrets.GPG…
|
| /external/wpa_supplicant_8/src/ap/ |
| D | ieee802_11_auth.c | 414 char *passphrase; in decode_tunnel_passwords() local 422 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 426 * Passphrase is NULL iff there is no i-th Tunnel-Password in decode_tunnel_passwords() 429 if (!passphrase) in decode_tunnel_passwords() 442 * passphrase does not contain the NULL termination. in decode_tunnel_passwords() 448 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 456 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 467 os_free(passphrase); in decode_tunnel_passwords()
|