Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 231) sorted by relevance

12345678910

/external/curl/tests/unit/
Dunit1394.c77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
102 if(passphrase) {
103 if(strcmp(p[2], passphrase)) {
105 "for -E param '%s'\n", p[2], passphrase, p[0]);
116 if(passphrase) {
118 "for -E param '%s'\n", passphrase, p[0]);
123 if(passphrase) free(passphrase);
/external/openssh/contrib/
Dgnome-ssh-askpass2.c88 char *passphrase, *local; in passphrase_dialog() local
169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog()
171 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog()
178 puts(passphrase); in passphrase_dialog()
183 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog()
184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
185 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
186 g_free(passphrase); in passphrase_dialog()
Dgnome-ssh-askpass1.c70 char *passphrase; in passphrase_dialog() local
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog()
131 puts(passphrase); in passphrase_dialog()
134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/external/autotest/client/cros/scripts/
Dwifi55 def configure(ssid, security, passphrase): argument
58 if passphrase is not None:
59 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
186 passphrase = None
189 passphrase = args[2]
192 return configure(ssid, security, passphrase)
/external/bison/build-aux/
Dgnupload244 unset passphrase
257 read -r passphrase
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
331 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
350 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
359 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directive
/external/syslinux/gpxe/src/net/80211/
Dwpa_psk.c50 char passphrase[64+1]; in wpa_psk_start() local
56 &net80211_key_setting, passphrase, in wpa_psk_start()
65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ), in wpa_psk_start()
69 passphrase ); in wpa_psk_start()
/external/openssh/contrib/cygwin/
Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
/external/openssh/
Dauthfile.c77 const char *passphrase, const char *comment, in sshkey_save_private() argument
85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private()
211 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument
235 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type()
242 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument
256 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd()
268 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument
291 (r = sshkey_parse_private_fileblob(buffer, passphrase, keyp, in sshkey_load_private()
453 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument
476 passphrase, &key, NULL, perm_ok)) != 0 || in sshkey_load_private_cert()
Dkey.c294 key_save_private(Key *key, const char *filename, const char *passphrase, in key_save_private() argument
300 if ((r = sshkey_save_private(key, filename, passphrase, comment, in key_save_private()
360 key_load_private(const char *path, const char *passphrase, in key_load_private() argument
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { in key_load_private()
380 key_load_private_cert(int type, const char *filename, const char *passphrase, in key_load_private_cert() argument
386 if ((r = sshkey_load_private_cert(type, filename, passphrase, in key_load_private_cert()
401 key_load_private_type(int type, const char *filename, const char *passphrase, in key_load_private_type() argument
407 if ((r = sshkey_load_private_type(type, filename, passphrase, in key_load_private_type()
Dsshconnect1.c224 char buf[300], *passphrase = NULL, *comment, *authfile; in try_rsa_authentication() local
277 passphrase = read_passphrase(buf, 0); in try_rsa_authentication()
278 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication()
280 authfile, passphrase, NULL, NULL); in try_rsa_authentication()
293 maybe_add_key_to_agent(authfile, private, comment, passphrase); in try_rsa_authentication()
295 if (passphrase != NULL) { in try_rsa_authentication()
296 explicit_bzero(passphrase, strlen(passphrase)); in try_rsa_authentication()
297 free(passphrase); in try_rsa_authentication()
Dssh-add.020 If any file requires a passphrase, ssh-add asks for the passphrase from
21 the user. The passphrase is read from the user's tty. ssh-add retries
22 the last passphrase if multiple identity files are given.
77 If ssh-add needs a passphrase, it will read the passphrase from
82 read the passphrase. This is particularly useful when calling
/external/autotest/server/brillo/
Dhost_utils.py53 def connect_to_ssid(host, ssid, passphrase): argument
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
/external/google-tv-pairing-protocol/cpp/src/polo/util/
Dcertificateutil.cc55 std::string passphrase) { in PKEYFromPEM() argument
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); in PKEYFromPEM()
64 std::string passphrase) { in PKEYToPEM() argument
67 &passphrase[0]); in PKEYToPEM()
Dcertificateutil.h47 std::string passphrase);
54 std::string passphrase);
/external/autotest/server/site_tests/brillo_PingTest/
Dbrillo_PingTest.py26 def run_once(self, host=None, ssid=None, passphrase=None, argument
44 passphrase = global_config.global_config.get_config_value(
48 (ssid, passphrase))
/external/syslinux/gpxe/src/crypto/
Dsha1extra.c94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len, in pbkdf2_sha1_f() argument
108 memcpy ( pass, passphrase, pass_len ); in pbkdf2_sha1_f()
145 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len, in pbkdf2_sha1() argument
154 pbkdf2_sha1_f ( passphrase, pass_len, salt, salt_len, in pbkdf2_sha1()
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/
Dbrillo_WifiInterfaceTest.py45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, argument
62 passphrase = global_config.global_config.get_config_value(
64 with host_utils.connect_to_ssid(host, ssid, passphrase):
/external/ImageMagick/MagickCore/
Dcipher.c538 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
546 if (passphrase == (const char *) NULL) in DecipherImage()
548 passkey=StringToStringInfo(passphrase); in DecipherImage()
748 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
756 if (passphrase == (const char *) NULL) in EncipherImage()
758 passkey=StringToStringInfo(passphrase); in EncipherImage()
1107 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
1115 (void) passphrase; in DecipherImage()
1163 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
1171 (void) passphrase; in EncipherImage()
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c435 char *passphrase; in decode_tunnel_passwords() local
443 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
450 if (passphrase == NULL) in decode_tunnel_passwords()
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
477 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
488 os_free(passphrase); in decode_tunnel_passwords()
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_datatypes.py234 def __init__(self, guid, passphrase=None, autoconnect=None): argument
246 self.passphrase = passphrase

12345678910