/external/curl/tests/unit/ |
D | unit1394.c | 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 102 if(passphrase) { 103 if(strcmp(p[2], passphrase)) { 105 "for -E param '%s'\n", p[2], passphrase, p[0]); 116 if(passphrase) { 118 "for -E param '%s'\n", passphrase, p[0]); 123 if(passphrase) free(passphrase);
|
/external/openssh/contrib/ |
D | gnome-ssh-askpass2.c | 88 char *passphrase, *local; in passphrase_dialog() local 169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 171 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog() 178 puts(passphrase); in passphrase_dialog() 183 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 185 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 186 g_free(passphrase); in passphrase_dialog()
|
D | gnome-ssh-askpass1.c | 70 char *passphrase; in passphrase_dialog() local 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog() 131 puts(passphrase); in passphrase_dialog() 134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/autotest/client/cros/scripts/ |
D | wifi | 55 def configure(ssid, security, passphrase): argument 58 if passphrase is not None: 59 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 186 passphrase = None 189 passphrase = args[2] 192 return configure(ssid, security, passphrase)
|
/external/bison/build-aux/ |
D | gnupload | 244 unset passphrase 257 read -r passphrase 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive 331 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive 350 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive 359 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
|
/external/syslinux/gpxe/src/net/80211/ |
D | wpa_psk.c | 50 char passphrase[64+1]; in wpa_psk_start() local 56 &net80211_key_setting, passphrase, in wpa_psk_start() 65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ), in wpa_psk_start() 69 passphrase ); in wpa_psk_start()
|
/external/openssh/contrib/cygwin/ |
D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1
|
/external/openssh/ |
D | authfile.c | 77 const char *passphrase, const char *comment, in sshkey_save_private() argument 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private() 211 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument 235 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type() 242 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument 256 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd() 268 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument 291 (r = sshkey_parse_private_fileblob(buffer, passphrase, keyp, in sshkey_load_private() 453 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument 476 passphrase, &key, NULL, perm_ok)) != 0 || in sshkey_load_private_cert()
|
D | key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, in key_save_private() argument 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, in key_save_private() 360 key_load_private(const char *path, const char *passphrase, in key_load_private() argument 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { in key_load_private() 380 key_load_private_cert(int type, const char *filename, const char *passphrase, in key_load_private_cert() argument 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, in key_load_private_cert() 401 key_load_private_type(int type, const char *filename, const char *passphrase, in key_load_private_type() argument 407 if ((r = sshkey_load_private_type(type, filename, passphrase, in key_load_private_type()
|
D | sshconnect1.c | 224 char buf[300], *passphrase = NULL, *comment, *authfile; in try_rsa_authentication() local 277 passphrase = read_passphrase(buf, 0); in try_rsa_authentication() 278 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication() 280 authfile, passphrase, NULL, NULL); in try_rsa_authentication() 293 maybe_add_key_to_agent(authfile, private, comment, passphrase); in try_rsa_authentication() 295 if (passphrase != NULL) { in try_rsa_authentication() 296 explicit_bzero(passphrase, strlen(passphrase)); in try_rsa_authentication() 297 free(passphrase); in try_rsa_authentication()
|
D | ssh-add.0 | 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries 22 the last passphrase if multiple identity files are given. 77 If ssh-add needs a passphrase, it will read the passphrase from 82 read the passphrase. This is particularly useful when calling
|
/external/autotest/server/brillo/ |
D | host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): argument 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
D | certificateutil.cc | 55 std::string passphrase) { in PKEYFromPEM() argument 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); in PKEYFromPEM() 64 std::string passphrase) { in PKEYToPEM() argument 67 &passphrase[0]); in PKEYToPEM()
|
D | certificateutil.h | 47 std::string passphrase); 54 std::string passphrase);
|
/external/autotest/server/site_tests/brillo_PingTest/ |
D | brillo_PingTest.py | 26 def run_once(self, host=None, ssid=None, passphrase=None, argument 44 passphrase = global_config.global_config.get_config_value( 48 (ssid, passphrase))
|
/external/syslinux/gpxe/src/crypto/ |
D | sha1extra.c | 94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len, in pbkdf2_sha1_f() argument 108 memcpy ( pass, passphrase, pass_len ); in pbkdf2_sha1_f() 145 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len, in pbkdf2_sha1() argument 154 pbkdf2_sha1_f ( passphrase, pass_len, salt, salt_len, in pbkdf2_sha1()
|
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/ |
D | brillo_WifiInterfaceTest.py | 45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, argument 62 passphrase = global_config.global_config.get_config_value( 64 with host_utils.connect_to_ssid(host, ssid, passphrase):
|
/external/ImageMagick/MagickCore/ |
D | cipher.c | 538 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 546 if (passphrase == (const char *) NULL) in DecipherImage() 548 passkey=StringToStringInfo(passphrase); in DecipherImage() 748 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 756 if (passphrase == (const char *) NULL) in EncipherImage() 758 passkey=StringToStringInfo(passphrase); in EncipherImage() 1107 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 1115 (void) passphrase; in DecipherImage() 1163 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 1171 (void) passphrase; in EncipherImage()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 435 char *passphrase; in decode_tunnel_passwords() local 443 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 450 if (passphrase == NULL) in decode_tunnel_passwords() 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 477 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 488 os_free(passphrase); in decode_tunnel_passwords()
|
/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_datatypes.py | 234 def __init__(self, guid, passphrase=None, autoconnect=None): argument 246 self.passphrase = passphrase
|