/external/wpa_supplicant_6/wpa_supplicant/ |
D | wpa_passphrase.c | 25 char *ssid, *passphrase, buf[64], *pos; in main() local 37 passphrase = argv[2]; in main() 53 passphrase = buf; in main() 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main() 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
D | config.c | 364 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && in wpa_config_parse_psk() 365 os_memcmp(ssid->passphrase, value, len) == 0) in wpa_config_parse_psk() 368 os_free(ssid->passphrase); in wpa_config_parse_psk() 369 ssid->passphrase = os_malloc(len + 1); in wpa_config_parse_psk() 370 if (ssid->passphrase == NULL) in wpa_config_parse_psk() 372 os_memcpy(ssid->passphrase, value, len); in wpa_config_parse_psk() 373 ssid->passphrase[len] = '\0'; in wpa_config_parse_psk() 389 os_free(ssid->passphrase); in wpa_config_parse_psk() 390 ssid->passphrase = NULL; in wpa_config_parse_psk() 402 if (ssid->passphrase) in wpa_config_write_psk() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 31 passphrase = argv[2]; in main() 47 passphrase = buf; in main() 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main() 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 59 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/external/openssh/contrib/ |
D | gnome-ssh-askpass2.c | 90 char *passphrase, *local; in passphrase_dialog() local 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog() 176 puts(passphrase); in passphrase_dialog() 181 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 183 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 184 g_free(passphrase); in passphrase_dialog()
|
D | gnome-ssh-askpass1.c | 70 char *passphrase; in passphrase_dialog() local 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog() 131 puts(passphrase); in passphrase_dialog() 134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
|
/external/openssh/ |
D | authfile.c | 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, in key_private_rsa1_to_blob() argument 99 cipher_num = (strcmp(passphrase, "") == 0) ? in key_private_rsa1_to_blob() 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_private_rsa1_to_blob() 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; in key_private_pem_to_blob() local 194 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob() 199 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob() 204 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob() 241 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, in key_private_to_blob() argument 246 return key_private_rsa1_to_blob(key, blob, passphrase, comment); in key_private_to_blob() 250 return key_private_pem_to_blob(key, blob, passphrase, comment); in key_private_to_blob() [all …]
|
D | ssh-add.0 | 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries 22 the last passphrase if multiple identity files are given. 68 If ssh-add needs a passphrase, it will read the passphrase from 72 SSH_ASKPASS and open an X11 window to read the passphrase. This
|
D | ssh-keygen.0 | 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] 48 name but ``.pub'' appended. The program also asks for a passphrase. The 49 passphrase may be empty to indicate no passphrase (host keys must have an 50 empty passphrase), or it may be a string of arbitrary length. A 51 passphrase is similar to a password, except it can be a phrase with a 57 alphanumeric characters. The passphrase can be changed later by using 60 There is no way to recover a lost passphrase. If the passphrase is lost 77 key file path, an empty passphrase, default bits for the key 104 the passphrase if the key has one, and for the new comment. 176 Provides the new passphrase. [all …]
|
D | sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; in try_rsa_authentication() local 263 passphrase = read_passphrase(buf, 0); in try_rsa_authentication() 264 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication() 266 authfile, passphrase, NULL, NULL); in try_rsa_authentication() 272 memset(passphrase, 0, strlen(passphrase)); in try_rsa_authentication() 273 xfree(passphrase); in try_rsa_authentication()
|
D | ssh-keygen.c | 1293 char new_comment[1024], *comment, *passphrase; in do_change_comment() local 1309 passphrase = xstrdup(identity_passphrase); in do_change_comment() 1311 passphrase = xstrdup(identity_new_passphrase); in do_change_comment() 1313 passphrase = read_passphrase("Enter passphrase: ", in do_change_comment() 1316 private = key_load_private(identity_file, passphrase, &comment); in do_change_comment() 1318 memset(passphrase, 0, strlen(passphrase)); in do_change_comment() 1319 xfree(passphrase); in do_change_comment() 1324 passphrase = xstrdup(""); in do_change_comment() 1339 memset(passphrase, 0, strlen(passphrase)); in do_change_comment() 1347 if (!key_save_private(private, identity_file, passphrase, new_comment)) { in do_change_comment() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/dropbear/ |
D | keyimport.c | 53 static sign_key *openssh_read(const char *filename, char *passphrase); 55 char *passphrase); 62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase); 64 char *passphrase); 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { in import_read() argument 82 return openssh_read(filename, passphrase); in import_read() 87 return sshcom_read(filename, passphrase); in import_read() 93 int import_write(const char *filename, sign_key *key, char *passphrase, in import_write() argument 97 return openssh_write(filename, key, passphrase); in import_write() 102 return sshcom_write(filename, key, passphrase); in import_write() [all …]
|
D | keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase, 39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
|
/external/chromium/chrome/browser/ui/webui/options/ |
D | sync_setup_handler.cc | 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { in GetPassphrase() argument 139 return result->GetString("passphrase", passphrase); in GetPassphrase() 144 std::string* passphrase) { in GetFirstPassphrase() argument 151 result->GetString("passphrase", passphrase); in GetFirstPassphrase() 422 std::string passphrase; in HandlePassphraseEntry() local 423 if (!GetPassphrase(json, &passphrase)) { in HandlePassphraseEntry() 430 flow_->OnPassphraseEntry(passphrase); in HandlePassphraseEntry() 448 std::string passphrase; in HandleFirstPassphrase() local 449 if (!GetFirstPassphrase(json, &option, &passphrase)) { in HandleFirstPassphrase() 456 flow_->OnFirstPassphraseEntry(option, passphrase); in HandleFirstPassphrase()
|
/external/openssh/contrib/cygwin/ |
D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1
|
/external/chromium/chrome/browser/resources/options/ |
D | sync_setup_overlay.css | 19 #sync-passphrase-container { 23 #sync-custom-passphrase { 27 #sync-passphrase-message { 31 .sync-custom-passphrase-input { 115 #passphrase-encryption-message { 120 #passphrase-input { 153 #sync-passphrase-warning {
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
D | driver_ps3.c | 32 if (!params->psk && !params->passphrase) { in wpa_driver_ps3_set_wpa_key() 49 } else if (params->passphrase) { in wpa_driver_ps3_set_wpa_key() 51 iwr.u.data.length = strlen(params->passphrase) + 3; in wpa_driver_ps3_set_wpa_key() 56 os_memcpy(buf + 1, params->passphrase, iwr.u.data.length - 3); in wpa_driver_ps3_set_wpa_key()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 458 char *passphrase; in hostapd_acl_recv_radius() local 481 passphrase = radius_msg_get_tunnel_password( in hostapd_acl_recv_radius() 486 cache->has_psk = passphrase != NULL; in hostapd_acl_recv_radius() 487 if (passphrase != NULL) { in hostapd_acl_recv_radius() 492 os_memcpy(strpassphrase, passphrase, in hostapd_acl_recv_radius() 500 os_free(passphrase); in hostapd_acl_recv_radius()
|
/external/chromium/chrome/browser/sync/protocol/ |
D | encryption.proto | 22 // change their passphrase (and thus their encryption key) at any time. When 24 // passphrase, but since we don't have transactions on the server-side, we
|
/external/chromium/chrome/browser/sync/ |
D | sync_setup_flow.h | 87 void OnPassphraseEntry(const std::string& passphrase); 96 const std::string& passphrase);
|
/external/chromium/chrome/browser/resources/ |
D | network_menu.js | 34 function sendConnect(index, passphrase, identity, auto_connect) { argument 38 passphrase, 147 sendConnect(index, this.attrs.passphrase, '', this.attrs.auto_connect);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
D | test_sha1.c | 251 char *passphrase; member 335 pbkdf2_sha1(test->passphrase, in main()
|