Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 88) sorted by relevance

1234

/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
31 passphrase = argv[2]; in main()
47 passphrase = buf; in main()
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) { in main()
55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
59 printf("\t#psk=\"%s\"\n", passphrase); in main()
Dp2p_supplicant.c503 if (ssid->passphrase && !s->passphrase) in wpas_p2p_store_persistent_group()
505 else if (ssid->passphrase && s->passphrase && in wpas_p2p_store_persistent_group()
506 os_strcmp(ssid->passphrase, s->passphrase) != 0) in wpas_p2p_store_persistent_group()
539 if (ssid->passphrase) { in wpas_p2p_store_persistent_group()
540 os_free(s->passphrase); in wpas_p2p_store_persistent_group()
541 s->passphrase = os_strdup(ssid->passphrase); in wpas_p2p_store_persistent_group()
547 if (s->passphrase && !s->psk_set) in wpas_p2p_store_persistent_group()
711 } else if (ssid && ssid->passphrase == NULL && ssid->psk_set) { in wpas_group_formation_completed()
727 ssid && ssid->passphrase ? ssid->passphrase : "", in wpas_group_formation_completed()
851 if (os_strlen(params->passphrase) > 0) { in p2p_go_configured()
[all …]
/external/openssh/contrib/
Dgnome-ssh-askpass2.c90 char *passphrase, *local; in passphrase_dialog() local
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog()
169 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog()
176 puts(passphrase); in passphrase_dialog()
181 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog()
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
183 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
184 g_free(passphrase); in passphrase_dialog()
Dgnome-ssh-askpass1.c70 char *passphrase; in passphrase_dialog() local
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog()
131 puts(passphrase); in passphrase_dialog()
134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
DREADME20 passphrase requester. This is highly recommended:
35 A GNOME and Gtk2 passphrase requesters. Use "make gnome-ssh-askpass1" or
/external/openssh/
Dauthfile.c85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, in key_private_rsa1_to_blob() argument
99 cipher_num = (strcmp(passphrase, "") == 0) ? in key_private_rsa1_to_blob()
150 cipher_set_key_string(&ciphercontext, cipher, passphrase, in key_private_rsa1_to_blob()
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; in key_private_pem_to_blob() local
194 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob()
199 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob()
204 cipher, passphrase, len, NULL, NULL); in key_private_pem_to_blob()
241 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, in key_private_to_blob() argument
246 return key_private_rsa1_to_blob(key, blob, passphrase, comment); in key_private_to_blob()
250 return key_private_pem_to_blob(key, blob, passphrase, comment); in key_private_to_blob()
[all …]
Dssh-add.020 If any file requires a passphrase, ssh-add asks for the passphrase from
21 the user. The passphrase is read from the user's tty. ssh-add retries
22 the last passphrase if multiple identity files are given.
68 If ssh-add needs a passphrase, it will read the passphrase from
72 SSH_ASKPASS and open an X11 window to read the passphrase. This
Dssh-keygen.013 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
48 name but ``.pub'' appended. The program also asks for a passphrase. The
49 passphrase may be empty to indicate no passphrase (host keys must have an
50 empty passphrase), or it may be a string of arbitrary length. A
51 passphrase is similar to a password, except it can be a phrase with a
57 alphanumeric characters. The passphrase can be changed later by using
60 There is no way to recover a lost passphrase. If the passphrase is lost
77 key file path, an empty passphrase, default bits for the key
104 the passphrase if the key has one, and for the new comment.
176 Provides the new passphrase.
[all …]
Dsshconnect1.c210 char buf[300], *passphrase, *comment, *authfile; in try_rsa_authentication() local
263 passphrase = read_passphrase(buf, 0); in try_rsa_authentication()
264 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication()
266 authfile, passphrase, NULL, NULL); in try_rsa_authentication()
272 memset(passphrase, 0, strlen(passphrase)); in try_rsa_authentication()
273 xfree(passphrase); in try_rsa_authentication()
Dssh-keygen.c1293 char new_comment[1024], *comment, *passphrase; in do_change_comment() local
1309 passphrase = xstrdup(identity_passphrase); in do_change_comment()
1311 passphrase = xstrdup(identity_new_passphrase); in do_change_comment()
1313 passphrase = read_passphrase("Enter passphrase: ", in do_change_comment()
1316 private = key_load_private(identity_file, passphrase, &comment); in do_change_comment()
1318 memset(passphrase, 0, strlen(passphrase)); in do_change_comment()
1319 xfree(passphrase); in do_change_comment()
1324 passphrase = xstrdup(""); in do_change_comment()
1339 memset(passphrase, 0, strlen(passphrase)); in do_change_comment()
1347 if (!key_save_private(private, identity_file, passphrase, new_comment)) { in do_change_comment()
[all …]
Dcipher.c301 const char *passphrase, int do_encrypt) in cipher_set_key_string() argument
307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); in cipher_set_key_string()
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/external/dropbear/
Dkeyimport.c53 static sign_key *openssh_read(const char *filename, char *passphrase);
55 char *passphrase);
62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase);
64 char *passphrase);
79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { in import_read() argument
82 return openssh_read(filename, passphrase); in import_read()
87 return sshcom_read(filename, passphrase); in import_read()
93 int import_write(const char *filename, sign_key *key, char *passphrase, in import_write() argument
97 return openssh_write(filename, key, passphrase); in import_write()
102 return sshcom_write(filename, key, passphrase); in import_write()
[all …]
Dkeyimport.h37 int import_write(const char *filename, sign_key *key, char *passphrase,
39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
/external/bison/build-aux/
Dgnupload244 unset passphrase
257 read -r passphrase
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
331 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
350 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
359 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
/external/chromium/chrome/browser/ui/webui/options/
Dsync_setup_handler.cc133 bool GetPassphrase(const std::string& json, std::string* passphrase) { in GetPassphrase() argument
139 return result->GetString("passphrase", passphrase); in GetPassphrase()
144 std::string* passphrase) { in GetFirstPassphrase() argument
151 result->GetString("passphrase", passphrase); in GetFirstPassphrase()
422 std::string passphrase; in HandlePassphraseEntry() local
423 if (!GetPassphrase(json, &passphrase)) { in HandlePassphraseEntry()
430 flow_->OnPassphraseEntry(passphrase); in HandlePassphraseEntry()
448 std::string passphrase; in HandleFirstPassphrase() local
449 if (!GetFirstPassphrase(json, &option, &passphrase)) { in HandleFirstPassphrase()
456 flow_->OnFirstPassphraseEntry(option, passphrase); in HandleFirstPassphrase()
/external/openssh/contrib/cygwin/
Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
/external/chromium/chrome/browser/resources/options/
Dsync_setup_overlay.css19 #sync-passphrase-container {
23 #sync-custom-passphrase {
27 #sync-passphrase-message {
31 .sync-custom-passphrase-input {
115 #passphrase-encryption-message {
120 #passphrase-input {
153 #sync-passphrase-warning {
/external/chromium/chrome/browser/sync/protocol/
Dencryption.proto22 // change their passphrase (and thus their encryption key) at any time. When
24 // passphrase, but since we don't have transactions on the server-side, we
/external/chromium/chrome/browser/sync/
Dsync_setup_flow.h87 void OnPassphraseEntry(const std::string& passphrase);
96 const std::string& passphrase);
/external/chromium/chrome/browser/resources/
Dnetwork_menu.js34 function sendConnect(index, passphrase, identity, auto_connect) { argument
38 passphrase,
147 sendConnect(index, this.attrs.passphrase, '', this.attrs.auto_connect);
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c424 char *passphrase, *strpassphrase; in decode_tunnel_passwords() local
432 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
439 if (passphrase == NULL) in decode_tunnel_passwords()
448 os_memcpy(strpassphrase, passphrase, passphraselen); in decode_tunnel_passwords()
459 os_free(passphrase); in decode_tunnel_passwords()

1234