Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 99) sorted by relevance

1234

/external/wpa_supplicant/
Dwpa_passphrase.c25 char *ssid, *passphrase, buf[64], *pos; in main() local
37 passphrase = argv[2]; in main()
53 passphrase = buf; in main()
56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main()
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
Dconfig.c338 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && in wpa_config_parse_psk()
339 os_memcmp(ssid->passphrase, value, len) == 0) in wpa_config_parse_psk()
342 os_free(ssid->passphrase); in wpa_config_parse_psk()
343 ssid->passphrase = os_malloc(len + 1); in wpa_config_parse_psk()
344 if (ssid->passphrase == NULL) in wpa_config_parse_psk()
346 os_memcpy(ssid->passphrase, value, len); in wpa_config_parse_psk()
347 ssid->passphrase[len] = '\0'; in wpa_config_parse_psk()
358 os_free(ssid->passphrase); in wpa_config_parse_psk()
359 ssid->passphrase = NULL; in wpa_config_parse_psk()
370 if (ssid->passphrase) in wpa_config_write_psk()
[all …]
Dsha1.c301 static void pbkdf2_sha1_f(const char *passphrase, const char *ssid, in pbkdf2_sha1_f() argument
310 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
327 hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, tmp); in pbkdf2_sha1_f()
331 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN, in pbkdf2_sha1_f()
353 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, in pbkdf2_sha1() argument
363 pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, count, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c25 char *ssid, *passphrase, buf[64], *pos; in main() local
37 passphrase = argv[2]; in main()
53 passphrase = buf; in main()
56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main()
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
Dp2p_supplicant.c404 if (ssid->passphrase && !s->passphrase) in wpas_p2p_store_persistent_group()
406 else if (ssid->passphrase && s->passphrase && in wpas_p2p_store_persistent_group()
407 os_strcmp(ssid->passphrase, s->passphrase) != 0) in wpas_p2p_store_persistent_group()
440 if (ssid->passphrase) { in wpas_p2p_store_persistent_group()
441 os_free(s->passphrase); in wpas_p2p_store_persistent_group()
442 s->passphrase = os_strdup(ssid->passphrase); in wpas_p2p_store_persistent_group()
448 if (s->passphrase && !s->psk_set) in wpas_p2p_store_persistent_group()
541 } else if (ssid && ssid->passphrase == NULL && ssid->psk_set) { in wpas_group_formation_completed()
557 ssid && ssid->passphrase ? ssid->passphrase : "", in wpas_group_formation_completed()
889 params->passphrase ? params->passphrase : "", in p2p_go_configured()
[all …]
Dconfig.c371 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && in wpa_config_parse_psk()
372 os_memcmp(ssid->passphrase, value, len) == 0) in wpa_config_parse_psk()
375 os_free(ssid->passphrase); in wpa_config_parse_psk()
376 ssid->passphrase = os_malloc(len + 1); in wpa_config_parse_psk()
377 if (ssid->passphrase == NULL) in wpa_config_parse_psk()
379 os_memcpy(ssid->passphrase, value, len); in wpa_config_parse_psk()
380 ssid->passphrase[len] = '\0'; in wpa_config_parse_psk()
396 os_free(ssid->passphrase); in wpa_config_parse_psk()
397 ssid->passphrase = NULL; in wpa_config_parse_psk()
409 if (ssid->passphrase) in wpa_config_write_psk()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/
Dwpa_passphrase.c25 char *ssid, *passphrase, buf[64], *pos; in main() local
37 passphrase = argv[2]; in main()
53 passphrase = buf; in main()
56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main()
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
Dconfig.c364 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && in wpa_config_parse_psk()
365 os_memcmp(ssid->passphrase, value, len) == 0) in wpa_config_parse_psk()
368 os_free(ssid->passphrase); in wpa_config_parse_psk()
369 ssid->passphrase = os_malloc(len + 1); in wpa_config_parse_psk()
370 if (ssid->passphrase == NULL) in wpa_config_parse_psk()
372 os_memcpy(ssid->passphrase, value, len); in wpa_config_parse_psk()
373 ssid->passphrase[len] = '\0'; in wpa_config_parse_psk()
389 os_free(ssid->passphrase); in wpa_config_parse_psk()
390 ssid->passphrase = NULL; in wpa_config_parse_psk()
402 if (ssid->passphrase) in wpa_config_write_psk()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c22 static int pbkdf2_sha1_f(const char *passphrase, const char *ssid, in pbkdf2_sha1_f() argument
31 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
48 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
54 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
80 int pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, in pbkdf2_sha1() argument
90 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/external/dropbear/
Dkeyimport.c53 static sign_key *openssh_read(const char *filename, char *passphrase);
55 char *passphrase);
62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase);
64 char *passphrase);
79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { in import_read() argument
82 return openssh_read(filename, passphrase); in import_read()
87 return sshcom_read(filename, passphrase); in import_read()
93 int import_write(const char *filename, sign_key *key, char *passphrase, in import_write() argument
97 return openssh_write(filename, key, passphrase); in import_write()
102 return sshcom_write(filename, key, passphrase); in import_write()
[all …]
Dkeyimport.h37 int import_write(const char *filename, sign_key *key, char *passphrase,
39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
/external/chromium/chrome/browser/ui/webui/options/
Dsync_setup_handler.cc133 bool GetPassphrase(const std::string& json, std::string* passphrase) { in GetPassphrase() argument
139 return result->GetString("passphrase", passphrase); in GetPassphrase()
144 std::string* passphrase) { in GetFirstPassphrase() argument
151 result->GetString("passphrase", passphrase); in GetFirstPassphrase()
422 std::string passphrase; in HandlePassphraseEntry() local
423 if (!GetPassphrase(json, &passphrase)) { in HandlePassphraseEntry()
430 flow_->OnPassphraseEntry(passphrase); in HandlePassphraseEntry()
448 std::string passphrase; in HandleFirstPassphrase() local
449 if (!GetFirstPassphrase(json, &option, &passphrase)) { in HandleFirstPassphrase()
456 flow_->OnFirstPassphraseEntry(option, passphrase); in HandleFirstPassphrase()
/external/chromium/chrome/browser/resources/options/
Dsync_setup_overlay.css19 #sync-passphrase-container {
23 #sync-custom-passphrase {
27 #sync-passphrase-message {
31 .sync-custom-passphrase-input {
115 #passphrase-encryption-message {
120 #passphrase-input {
153 #sync-passphrase-warning {
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
Ddriver_ps3.c32 if (!params->psk && !params->passphrase) { in wpa_driver_ps3_set_wpa_key()
49 } else if (params->passphrase) { in wpa_driver_ps3_set_wpa_key()
51 iwr.u.data.length = strlen(params->passphrase) + 3; in wpa_driver_ps3_set_wpa_key()
56 os_memcpy(buf + 1, params->passphrase, iwr.u.data.length - 3); in wpa_driver_ps3_set_wpa_key()
/external/chromium/chrome/browser/sync/
Dsync_setup_flow.h87 void OnPassphraseEntry(const std::string& passphrase);
96 const std::string& passphrase);
Dsync_setup_flow.cc253 void SyncSetupFlow::OnPassphraseEntry(const std::string& passphrase) { in OnPassphraseEntry() argument
255 service_->SetPassphrase(passphrase, true, false); in OnPassphraseEntry()
270 const std::string& passphrase) { in OnFirstPassphraseEntry() argument
/external/chromium/chrome/browser/sync/protocol/
Dencryption.proto22 // change their passphrase (and thus their encryption key) at any time. When
24 // passphrase, but since we don't have transactions on the server-side, we
/external/chromium/chrome/browser/resources/
Dnetwork_menu.js34 function sendConnect(index, passphrase, identity, auto_connect) { argument
38 passphrase,
147 sendConnect(index, this.attrs.passphrase, '', this.attrs.auto_connect);
/external/wpa_supplicant/tests/
Dtest_sha1.c232 char *passphrase; member
316 pbkdf2_sha1(test->passphrase, in main()
/external/wpa_supplicant_6/wpa_supplicant/tests/
Dtest_sha1.c251 char *passphrase; member
335 pbkdf2_sha1(test->passphrase, in main()
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Dsha1.c304 static void pbkdf2_sha1_f(const char *passphrase, const char *ssid, in pbkdf2_sha1_f() argument
313 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
330 hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, tmp); in pbkdf2_sha1_f()
334 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN, in pbkdf2_sha1_f()
356 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, in pbkdf2_sha1() argument
366 pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, count, in pbkdf2_sha1()
/external/chromium/chrome/browser/chromeos/status/
Dnetwork_menu.h44 std::string passphrase; member
60 const std::string& passphrase,

1234