Home
last modified time | relevance | path

Searched full:passphrase (Results 1 – 25 of 254) sorted by relevance

1234567891011

/external/python/google-auth-library-python/google/auth/transport/
D_mtls_helper.py47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL
92 passphrase.
100 bytes in PEM format and passphrase bytes.
104 the cert provider command or generating cert, key and passphrase.
121 # Extract certificate (chain), key and passphrase.
132 raise exceptions.ClientCertError("Passphrase is missing or invalid")
140 raise exceptions.ClientCertError("Passphrase is not expected")
148 """Returns the client side certificate, private key and passphrase.
152 and passphrase will be generated; otherwise, unencrypted private key
153 will be generated and passphrase will be None.
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
21 char *ssid, *passphrase, buf[64], *pos; in main() local
25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main()
26 "\nIf passphrase is left out, it will be read from " in main()
34 passphrase = argv[2]; in main()
38 fprintf(stderr, "# reading passphrase from stdin\n"); in main()
50 fprintf(stderr, "Failed to read passphrase\n"); in main()
67 passphrase = buf; in main()
70 len = os_strlen(passphrase); in main()
72 fprintf(stderr, "Passphrase must be 8..63 characters\n"); in main()
[all …]
/external/python/google-auth-library-python/tests/transport/
Dtest__mtls_helper.py42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable
44 -----END PASSPHRASE-----"""
160 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"])
163 assert passphrase is None
166 pytest.public_cert_bytes + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b""
168 cert, key, passphrase = _mtls_helper._run_cert_provider_command(
173 assert passphrase == PASSPHRASE_VALUE
181 cert, key, passphrase = _mtls_helper._run_cert_provider_command(["command"])
184 assert passphrase is None
187 PUBLIC_CERT_CHAIN_BYTES + ENCRYPTED_EC_PRIVATE_KEY + PASSPHRASE, b""
[all …]
/external/curl/tests/unit/
Dunit1394.c47 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
82 char *certname, *passphrase; variable
84 parse_cert_parameter(p[0], &certname, &passphrase);
107 if(passphrase) {
108 if(strcmp(p[2], passphrase)) {
109 printf("expected passphrase '%s' but got '%s'"
110 "for -E param '%s'\n", p[2], passphrase, p[0]);
115 printf("expected passphrase '%s' but got NULL "
121 if(passphrase) {
122 printf("expected passphrase NULL but got '%s' "
[all …]
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/external/autotest/client/cros/scripts/
Dwifi40 print(cmd, 'connect <ssid> [passphrase] [security]')
41 print(' |security| defaults to "psk" when |passphrase|', end=' ')
51 print(cmd, 'configure <ssid> [passphrase] [security]')
52 print(' |security| defaults to "psk" when |passphrase|', end=' ')
57 def configure(ssid, security, passphrase): argument
60 if passphrase is not None:
61 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
80 like the passphrase for psk security.
131 like the passphrase for psk security.
188 passphrase = None
[all …]
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
62 * @passphrase: ASCII passphrase
74 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
84 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
/external/autotest/server/brillo/
Dhost_utils.py53 def connect_to_ssid(host, ssid, passphrase): argument
59 @param passphrase: A string representing the passphrase to the ssid.
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
/external/google-auth-library-java/
DRELEASE.md24 * Keep the defaults, but specify a passphrase
25 * The passphrase can be random; you just need to remember it long enough to finish the next step
26 * One way to make a random passphrase: ```base64 /dev/urandom | head -c20; echo;```
37 * Create a file at ```$HOME/.m2/settings.xml``` with your passphrase and your sonatype username and…
48 <gpg.passphrase>[the password for your gpg key]</gpg.passphrase>
/external/rust/crates/openssl/src/
Dmacros.rs6 pub fn $n2(pem: &[u8], passphrase: &[u8]) -> Result<$t, crate::error::ErrorStack> {
10 let passphrase = ::std::ffi::CString::new(passphrase).unwrap(); localVariable
14 passphrase.as_ptr() as *const _ as *mut _))
58 passphrase: &[u8]
62 assert!(passphrase.len() <= ::libc::c_int::max_value() as usize);
66 passphrase.as_ptr() as *const _ as *mut _,
67 passphrase.len() as ::libc::c_int,
/external/robolectric/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowWifiP2pGroup.java23 public void setPassphrase(String passphrase) { in setPassphrase() argument
24 reflector(WifiP2pGroupReflector.class, realObject).setInterface(passphrase); in setPassphrase()
39 void setPassphrase(String passphrase); in setPassphrase() argument
/external/scapy/scapy/modules/krack/
D__init__.py11 passphrase="testtest", # Associated passphrase
15 passphrase.
/external/ot-br-posix/tools/
Dpskc.cpp55 " pskc <PASSPHRASE> <EXTPANID> <NETWORK_NAME>\n" in help()
70 VerifyOrExit(length > 0, printf("PASSPHRASE must not be empty.\n")); in printPSKc()
72 printf("PASSPHRASE Passphrase must be no more than %d bytes.\n", kMaxPassphrase)); in printPSKc()
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_datatypes.py235 def __init__(self, guid, passphrase=None, autoconnect=None): argument
239 @param passphrase string optional psk passphrase.
247 self.passphrase = passphrase
/external/freetype/docs/
Drelease126 unset passphrase
128 PATH=/empty echo -n "Enter GPG passphrase: "
130 read -r passphrase
146 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
DWifiAwareManagerFacade.java114 private static final String NS_KEY_PASSPHRASE = "passphrase";
132 if (ns.passphrase != null) { in getJsonString()
133 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString()
153 String passphrase = null; in getNetworkSpecifier() local
178 passphrase = j.getString(NS_KEY_PASSPHRASE); in getNetworkSpecifier()
188 passphrase, port, transportProtocol); in getNetworkSpecifier()
591 @RpcParameter(name = "passphrase", in wifiAwareCreateNetworkSpecifier()
592 description = "Passphrase of the data-path. Optional, can be empty/null.") in wifiAwareCreateNetworkSpecifier()
593 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifier() argument
629 passphrase, in wifiAwareCreateNetworkSpecifier()
[all …]
/external/f2fs-tools/tools/
Df2fscrypt.c455 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
459 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
471 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512()
483 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
485 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
492 * buf: [previous hash || passphrase] in pbkdf2_sha512()
518 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
525 p = fgets(passphrase, len, stdin); in get_passphrase()
532 p = strrchr(passphrase, '\n'); in get_passphrase()
534 p = passphrase + len - 1; in get_passphrase()
[all …]
Df2fscrypt.818 Prompts the user for a passphrase and inserts it into the specified
57 Enter passphrase (echo disabled):
79 Enter passphrase (echo disabled):
/external/e2fsprogs/misc/
De4crypt.c406 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
410 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
422 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, in pbkdf2_sha512()
434 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
436 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
443 * buf: [previous hash || passphrase] in pbkdf2_sha512()
469 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
476 p = fgets(passphrase, len, stdin); in get_passphrase()
483 p = strrchr(passphrase, '\n'); in get_passphrase()
485 p = passphrase + len - 1; in get_passphrase()
[all …]
/external/autotest/client/cros/enterprise/
Dtest_policy.py124 {'WiFi': {'Passphrase': 'Secret'}}]}}
133 {'WiFi': {'Passphrase': '********'}}]}}
147 {'WiFi': {'Passphrase': '********'}}]}
152 {'WiFi': {'Passphrase': 'Bad'}}]}
/external/grpc-grpc-java/buildscripts/kokoro/
Dupload_artifacts.sh71 bash -c 'cat ~/java_signing/passphrase | gpg --batch --passphrase-fd 0 --detach-sign -a {}' \;
79 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
/external/google-java-format/.github/workflows/
Drelease.yml29 gpg-passphrase: MAVEN_GPG_PASSPHRASE
50 …gress -pl '!eclipse_plugin' -P sonatype-oss-release clean deploy -Dgpg.passphrase="${{ secrets.GPG…
54 …r-progress -pl 'eclipse_plugin' verify gpg:sign -DskipTests=true -Dgpg.passphrase="${{ secrets.GPG…
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c414 char *passphrase; in decode_tunnel_passwords() local
422 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
426 * Passphrase is NULL iff there is no i-th Tunnel-Password in decode_tunnel_passwords()
429 if (!passphrase) in decode_tunnel_passwords()
442 * passphrase does not contain the NULL termination. in decode_tunnel_passwords()
448 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
456 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
467 os_free(passphrase); in decode_tunnel_passwords()

1234567891011