/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 31 passphrase = argv[2]; in main() 47 passphrase = buf; in main() 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main() 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 59 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
D | p2p_supplicant.c | 503 if (ssid->passphrase && !s->passphrase) in wpas_p2p_store_persistent_group() 505 else if (ssid->passphrase && s->passphrase && in wpas_p2p_store_persistent_group() 506 os_strcmp(ssid->passphrase, s->passphrase) != 0) in wpas_p2p_store_persistent_group() 539 if (ssid->passphrase) { in wpas_p2p_store_persistent_group() 540 os_free(s->passphrase); in wpas_p2p_store_persistent_group() 541 s->passphrase = os_strdup(ssid->passphrase); in wpas_p2p_store_persistent_group() 547 if (s->passphrase && !s->psk_set) in wpas_p2p_store_persistent_group() 711 } else if (ssid && ssid->passphrase == NULL && ssid->psk_set) { in wpas_group_formation_completed() 727 ssid && ssid->passphrase ? ssid->passphrase : "", in wpas_group_formation_completed() 851 if (os_strlen(params->passphrase) > 0) { in p2p_go_configured() [all …]
|
/external/openssh/contrib/ |
D | gnome-ssh-askpass2.c | 90 char *passphrase, *local; in passphrase_dialog() local 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog() 176 puts(passphrase); in passphrase_dialog() 181 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 183 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 184 g_free(passphrase); in passphrase_dialog()
|
D | gnome-ssh-askpass1.c | 70 char *passphrase; in passphrase_dialog() local 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog() 131 puts(passphrase); in passphrase_dialog() 134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
|
D | README | 20 passphrase requester. This is highly recommended: 35 A GNOME and Gtk2 passphrase requesters. Use "make gnome-ssh-askpass1" or
|
/external/openssh/ |
D | authfile.c | 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, in key_private_rsa1_to_blob() argument 99 cipher_num = (strcmp(passphrase, "") == 0) ? in key_private_rsa1_to_blob() 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_private_rsa1_to_blob() 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; in key_private_pem_to_blob() local 194 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob() 199 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob() 204 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob() 241 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, in key_private_to_blob() argument 246 return key_private_rsa1_to_blob(key, blob, passphrase, comment); in key_private_to_blob() 250 return key_private_pem_to_blob(key, blob, passphrase, comment); in key_private_to_blob() [all …]
|
D | ssh-add.0 | 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries 22 the last passphrase if multiple identity files are given. 68 If ssh-add needs a passphrase, it will read the passphrase from 72 SSH_ASKPASS and open an X11 window to read the passphrase. This
|
D | ssh-keygen.0 | 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] 48 name but ``.pub'' appended. The program also asks for a passphrase. The 49 passphrase may be empty to indicate no passphrase (host keys must have an 50 empty passphrase), or it may be a string of arbitrary length. A 51 passphrase is similar to a password, except it can be a phrase with a 57 alphanumeric characters. The passphrase can be changed later by using 60 There is no way to recover a lost passphrase. If the passphrase is lost 77 key file path, an empty passphrase, default bits for the key 104 the passphrase if the key has one, and for the new comment. 176 Provides the new passphrase. [all …]
|
D | sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; in try_rsa_authentication() local 263 passphrase = read_passphrase(buf, 0); in try_rsa_authentication() 264 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication() 266 authfile, passphrase, NULL, NULL); in try_rsa_authentication() 272 memset(passphrase, 0, strlen(passphrase)); in try_rsa_authentication() 273 xfree(passphrase); in try_rsa_authentication()
|
D | ssh-keygen.c | 1293 char new_comment[1024], *comment, *passphrase; in do_change_comment() local 1309 passphrase = xstrdup(identity_passphrase); in do_change_comment() 1311 passphrase = xstrdup(identity_new_passphrase); in do_change_comment() 1313 passphrase = read_passphrase("Enter passphrase: ", in do_change_comment() 1316 private = key_load_private(identity_file, passphrase, &comment); in do_change_comment() 1318 memset(passphrase, 0, strlen(passphrase)); in do_change_comment() 1319 xfree(passphrase); in do_change_comment() 1324 passphrase = xstrdup(""); in do_change_comment() 1339 memset(passphrase, 0, strlen(passphrase)); in do_change_comment() 1347 if (!key_save_private(private, identity_file, passphrase, new_comment)) { in do_change_comment() [all …]
|
D | cipher.c | 301 const char *passphrase, int do_encrypt) in cipher_set_key_string() argument 307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); in cipher_set_key_string()
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/dropbear/ |
D | keyimport.c | 53 static sign_key *openssh_read(const char *filename, char *passphrase); 55 char *passphrase); 62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase); 64 char *passphrase); 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { in import_read() argument 82 return openssh_read(filename, passphrase); in import_read() 87 return sshcom_read(filename, passphrase); in import_read() 93 int import_write(const char *filename, sign_key *key, char *passphrase, in import_write() argument 97 return openssh_write(filename, key, passphrase); in import_write() 102 return sshcom_write(filename, key, passphrase); in import_write() [all …]
|
D | keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase, 39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
|
/external/bison/build-aux/ |
D | gnupload | 244 unset passphrase 257 read -r passphrase 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive 331 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive 350 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive 359 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
|
/external/chromium/chrome/browser/ui/webui/options/ |
D | sync_setup_handler.cc | 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { in GetPassphrase() argument 139 return result->GetString("passphrase", passphrase); in GetPassphrase() 144 std::string* passphrase) { in GetFirstPassphrase() argument 151 result->GetString("passphrase", passphrase); in GetFirstPassphrase() 422 std::string passphrase; in HandlePassphraseEntry() local 423 if (!GetPassphrase(json, &passphrase)) { in HandlePassphraseEntry() 430 flow_->OnPassphraseEntry(passphrase); in HandlePassphraseEntry() 448 std::string passphrase; in HandleFirstPassphrase() local 449 if (!GetFirstPassphrase(json, &option, &passphrase)) { in HandleFirstPassphrase() 456 flow_->OnFirstPassphraseEntry(option, passphrase); in HandleFirstPassphrase()
|
/external/openssh/contrib/cygwin/ |
D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1
|
/external/chromium/chrome/browser/resources/options/ |
D | sync_setup_overlay.css | 19 #sync-passphrase-container { 23 #sync-custom-passphrase { 27 #sync-passphrase-message { 31 .sync-custom-passphrase-input { 115 #passphrase-encryption-message { 120 #passphrase-input { 153 #sync-passphrase-warning {
|
/external/chromium/chrome/browser/sync/protocol/ |
D | encryption.proto | 22 // change their passphrase (and thus their encryption key) at any time. When 24 // passphrase, but since we don't have transactions on the server-side, we
|
/external/chromium/chrome/browser/sync/ |
D | sync_setup_flow.h | 87 void OnPassphraseEntry(const std::string& passphrase); 96 const std::string& passphrase);
|
/external/chromium/chrome/browser/resources/ |
D | network_menu.js | 34 function sendConnect(index, passphrase, identity, auto_connect) { argument 38 passphrase, 147 sendConnect(index, this.attrs.passphrase, '', this.attrs.auto_connect);
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 424 char *passphrase, *strpassphrase; in decode_tunnel_passwords() local 432 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 439 if (passphrase == NULL) in decode_tunnel_passwords() 448 os_memcpy(strpassphrase, passphrase, passphraselen); in decode_tunnel_passwords() 459 os_free(passphrase); in decode_tunnel_passwords()
|