/external/wpa_supplicant/ |
D | wpa_passphrase.c | 25 char *ssid, *passphrase, buf[64], *pos; in main() local 37 passphrase = argv[2]; in main() 53 passphrase = buf; in main() 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main() 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
D | config.c | 338 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && in wpa_config_parse_psk() 339 os_memcmp(ssid->passphrase, value, len) == 0) in wpa_config_parse_psk() 342 os_free(ssid->passphrase); in wpa_config_parse_psk() 343 ssid->passphrase = os_malloc(len + 1); in wpa_config_parse_psk() 344 if (ssid->passphrase == NULL) in wpa_config_parse_psk() 346 os_memcpy(ssid->passphrase, value, len); in wpa_config_parse_psk() 347 ssid->passphrase[len] = '\0'; in wpa_config_parse_psk() 358 os_free(ssid->passphrase); in wpa_config_parse_psk() 359 ssid->passphrase = NULL; in wpa_config_parse_psk() 370 if (ssid->passphrase) in wpa_config_write_psk() [all …]
|
D | sha1.c | 301 static void pbkdf2_sha1_f(const char *passphrase, const char *ssid, in pbkdf2_sha1_f() argument 310 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 327 hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, tmp); in pbkdf2_sha1_f() 331 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN, in pbkdf2_sha1_f() 353 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, in pbkdf2_sha1() argument 363 pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, count, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 25 char *ssid, *passphrase, buf[64], *pos; in main() local 37 passphrase = argv[2]; in main() 53 passphrase = buf; in main() 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main() 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
D | p2p_supplicant.c | 404 if (ssid->passphrase && !s->passphrase) in wpas_p2p_store_persistent_group() 406 else if (ssid->passphrase && s->passphrase && in wpas_p2p_store_persistent_group() 407 os_strcmp(ssid->passphrase, s->passphrase) != 0) in wpas_p2p_store_persistent_group() 440 if (ssid->passphrase) { in wpas_p2p_store_persistent_group() 441 os_free(s->passphrase); in wpas_p2p_store_persistent_group() 442 s->passphrase = os_strdup(ssid->passphrase); in wpas_p2p_store_persistent_group() 448 if (s->passphrase && !s->psk_set) in wpas_p2p_store_persistent_group() 541 } else if (ssid && ssid->passphrase == NULL && ssid->psk_set) { in wpas_group_formation_completed() 557 ssid && ssid->passphrase ? ssid->passphrase : "", in wpas_group_formation_completed() 889 params->passphrase ? params->passphrase : "", in p2p_go_configured() [all …]
|
D | config.c | 371 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && in wpa_config_parse_psk() 372 os_memcmp(ssid->passphrase, value, len) == 0) in wpa_config_parse_psk() 375 os_free(ssid->passphrase); in wpa_config_parse_psk() 376 ssid->passphrase = os_malloc(len + 1); in wpa_config_parse_psk() 377 if (ssid->passphrase == NULL) in wpa_config_parse_psk() 379 os_memcpy(ssid->passphrase, value, len); in wpa_config_parse_psk() 380 ssid->passphrase[len] = '\0'; in wpa_config_parse_psk() 396 os_free(ssid->passphrase); in wpa_config_parse_psk() 397 ssid->passphrase = NULL; in wpa_config_parse_psk() 409 if (ssid->passphrase) in wpa_config_write_psk() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | wpa_passphrase.c | 25 char *ssid, *passphrase, buf[64], *pos; in main() local 37 passphrase = argv[2]; in main() 53 passphrase = buf; in main() 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main() 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
D | config.c | 364 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && in wpa_config_parse_psk() 365 os_memcmp(ssid->passphrase, value, len) == 0) in wpa_config_parse_psk() 368 os_free(ssid->passphrase); in wpa_config_parse_psk() 369 ssid->passphrase = os_malloc(len + 1); in wpa_config_parse_psk() 370 if (ssid->passphrase == NULL) in wpa_config_parse_psk() 372 os_memcpy(ssid->passphrase, value, len); in wpa_config_parse_psk() 373 ssid->passphrase[len] = '\0'; in wpa_config_parse_psk() 389 os_free(ssid->passphrase); in wpa_config_parse_psk() 390 ssid->passphrase = NULL; in wpa_config_parse_psk() 402 if (ssid->passphrase) in wpa_config_write_psk() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 22 static int pbkdf2_sha1_f(const char *passphrase, const char *ssid, in pbkdf2_sha1_f() argument 31 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 48 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 54 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 80 int pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, in pbkdf2_sha1() argument 90 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/dropbear/ |
D | keyimport.c | 53 static sign_key *openssh_read(const char *filename, char *passphrase); 55 char *passphrase); 62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase); 64 char *passphrase); 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { in import_read() argument 82 return openssh_read(filename, passphrase); in import_read() 87 return sshcom_read(filename, passphrase); in import_read() 93 int import_write(const char *filename, sign_key *key, char *passphrase, in import_write() argument 97 return openssh_write(filename, key, passphrase); in import_write() 102 return sshcom_write(filename, key, passphrase); in import_write() [all …]
|
D | keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase, 39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
|
/external/chromium/chrome/browser/ui/webui/options/ |
D | sync_setup_handler.cc | 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { in GetPassphrase() argument 139 return result->GetString("passphrase", passphrase); in GetPassphrase() 144 std::string* passphrase) { in GetFirstPassphrase() argument 151 result->GetString("passphrase", passphrase); in GetFirstPassphrase() 422 std::string passphrase; in HandlePassphraseEntry() local 423 if (!GetPassphrase(json, &passphrase)) { in HandlePassphraseEntry() 430 flow_->OnPassphraseEntry(passphrase); in HandlePassphraseEntry() 448 std::string passphrase; in HandleFirstPassphrase() local 449 if (!GetFirstPassphrase(json, &option, &passphrase)) { in HandleFirstPassphrase() 456 flow_->OnFirstPassphraseEntry(option, passphrase); in HandleFirstPassphrase()
|
/external/chromium/chrome/browser/resources/options/ |
D | sync_setup_overlay.css | 19 #sync-passphrase-container { 23 #sync-custom-passphrase { 27 #sync-passphrase-message { 31 .sync-custom-passphrase-input { 115 #passphrase-encryption-message { 120 #passphrase-input { 153 #sync-passphrase-warning {
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
D | driver_ps3.c | 32 if (!params->psk && !params->passphrase) { in wpa_driver_ps3_set_wpa_key() 49 } else if (params->passphrase) { in wpa_driver_ps3_set_wpa_key() 51 iwr.u.data.length = strlen(params->passphrase) + 3; in wpa_driver_ps3_set_wpa_key() 56 os_memcpy(buf + 1, params->passphrase, iwr.u.data.length - 3); in wpa_driver_ps3_set_wpa_key()
|
/external/chromium/chrome/browser/sync/ |
D | sync_setup_flow.h | 87 void OnPassphraseEntry(const std::string& passphrase); 96 const std::string& passphrase);
|
D | sync_setup_flow.cc | 253 void SyncSetupFlow::OnPassphraseEntry(const std::string& passphrase) { in OnPassphraseEntry() argument 255 service_->SetPassphrase(passphrase, true, false); in OnPassphraseEntry() 270 const std::string& passphrase) { in OnFirstPassphraseEntry() argument
|
/external/chromium/chrome/browser/sync/protocol/ |
D | encryption.proto | 22 // change their passphrase (and thus their encryption key) at any time. When 24 // passphrase, but since we don't have transactions on the server-side, we
|
/external/chromium/chrome/browser/resources/ |
D | network_menu.js | 34 function sendConnect(index, passphrase, identity, auto_connect) { argument 38 passphrase, 147 sendConnect(index, this.attrs.passphrase, '', this.attrs.auto_connect);
|
/external/wpa_supplicant/tests/ |
D | test_sha1.c | 232 char *passphrase; member 316 pbkdf2_sha1(test->passphrase, in main()
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
D | test_sha1.c | 251 char *passphrase; member 335 pbkdf2_sha1(test->passphrase, in main()
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | sha1.c | 304 static void pbkdf2_sha1_f(const char *passphrase, const char *ssid, in pbkdf2_sha1_f() argument 313 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 330 hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, tmp); in pbkdf2_sha1_f() 334 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN, in pbkdf2_sha1_f() 356 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, in pbkdf2_sha1() argument 366 pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, count, in pbkdf2_sha1()
|
/external/chromium/chrome/browser/chromeos/status/ |
D | network_menu.h | 44 std::string passphrase; member 60 const std::string& passphrase,
|