/external/curl/tests/unit/ |
D | unit1394.c | 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 102 if(passphrase) { 103 if(strcmp(p[2], passphrase)) { 105 "for -E param '%s'\n", p[2], passphrase, p[0]); 116 if(passphrase) { 118 "for -E param '%s'\n", passphrase, p[0]); 123 if(passphrase) free(passphrase);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
D | wps_supplicant.c | 312 if (new_ssid->passphrase && ssid->passphrase && in wpas_wps_remove_dup_network() 313 os_strcmp(new_ssid->passphrase, ssid->passphrase) != in wpas_wps_remove_dup_network() 328 if ((new_ssid->passphrase && !ssid->passphrase) || in wpas_wps_remove_dup_network() 329 (!new_ssid->passphrase && ssid->passphrase)) { in wpas_wps_remove_dup_network() 535 os_free(ssid->passphrase); in wpa_supplicant_wps_cred() 536 ssid->passphrase = os_malloc(cred->key_len + 1); in wpa_supplicant_wps_cred() 537 if (ssid->passphrase == NULL) in wpa_supplicant_wps_cred() 539 os_memcpy(ssid->passphrase, cred->key, cred->key_len); in wpa_supplicant_wps_cred() 540 ssid->passphrase[cred->key_len] = '\0'; in wpa_supplicant_wps_cred() 1998 if (ssid->passphrase) { in wpas_wps_network_to_cred() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/autotest/client/cros/scripts/ |
D | wifi | 53 def configure(ssid, security, passphrase): argument 56 if passphrase is not None: 57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 184 passphrase = None 187 passphrase = args[2] 190 return configure(ssid, security, passphrase)
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/syslinux/gpxe/src/net/80211/ |
D | wpa_psk.c | 50 char passphrase[64+1]; in wpa_psk_start() local 56 &net80211_key_setting, passphrase, in wpa_psk_start() 65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ), in wpa_psk_start() 69 passphrase ); in wpa_psk_start()
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
D | certificateutil.cc | 55 std::string passphrase) { in PKEYFromPEM() argument 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); in PKEYFromPEM() 64 std::string passphrase) { in PKEYToPEM() argument 67 &passphrase[0]); in PKEYToPEM()
|
D | certificateutil.h | 47 std::string passphrase); 54 std::string passphrase);
|
/external/autotest/server/brillo/ |
D | host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): argument 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
/external/syslinux/gpxe/src/crypto/ |
D | sha1extra.c | 94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len, in pbkdf2_sha1_f() argument 108 memcpy ( pass, passphrase, pass_len ); in pbkdf2_sha1_f() 145 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len, in pbkdf2_sha1() argument 154 pbkdf2_sha1_f ( passphrase, pass_len, salt, salt_len, in pbkdf2_sha1()
|
/external/autotest/server/site_tests/brillo_PingTest/ |
D | brillo_PingTest.py | 26 def run_once(self, host=None, ssid=None, passphrase=None, argument 44 passphrase = global_config.global_config.get_config_value( 48 (ssid, passphrase))
|
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/ |
D | brillo_WifiInterfaceTest.py | 45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, argument 62 passphrase = global_config.global_config.get_config_value( 64 with host_utils.connect_to_ssid(host, ssid, passphrase):
|
/external/ImageMagick/MagickCore/ |
D | cipher.c | 538 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 546 if (passphrase == (const char *) NULL) in DecipherImage() 548 passkey=StringToStringInfo(passphrase); in DecipherImage() 748 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 756 if (passphrase == (const char *) NULL) in EncipherImage() 758 passkey=StringToStringInfo(passphrase); in EncipherImage() 1107 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 1115 (void) passphrase; in DecipherImage() 1163 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 1171 (void) passphrase; in EncipherImage()
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowWifiP2pGroup.java | 19 public void setPassphrase(String passphrase) { in setPassphrase() argument 20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase); in setPassphrase()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 434 char *passphrase; in decode_tunnel_passwords() local 442 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 449 if (passphrase == NULL) in decode_tunnel_passwords() 468 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 476 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 487 os_free(passphrase); in decode_tunnel_passwords()
|
/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_datatypes.py | 234 def __init__(self, guid, passphrase=None, autoconnect=None): argument 246 self.passphrase = passphrase
|
/external/f2fs-tools/tools/ |
D | f2fscrypt.c | 450 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 454 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 478 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 480 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 513 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 520 p = fgets(passphrase, len, stdin); in get_passphrase() 527 p = strrchr(passphrase, '\n'); in get_passphrase() 529 p = passphrase + len - 1; in get_passphrase()
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 409 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 468 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 475 p = fgets(passphrase, len, stdin); in get_passphrase() 482 p = strrchr(passphrase, '\n'); in get_passphrase() 484 p = passphrase + len - 1; in get_passphrase()
|
/external/testng/ |
D | README.dev | 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy 36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
|
/external/freetype/docs/ |
D | release | 104 unset passphrase 106 PATH=/empty echo -n "Enter GPG passphrase: " 108 read -r passphrase 124 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
D | WifiAwareManagerFacade.java | 128 if (ns.passphrase != null) { in getJsonString() 129 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString() 143 String passphrase = null; in getNetworkSpecifier() local 167 passphrase = j.getString((NS_KEY_PASSPHRASE)); in getNetworkSpecifier() 171 passphrase, Process.myUid()); in getNetworkSpecifier() 567 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifier() argument 601 passphrase, in wifiAwareCreateNetworkSpecifier() 619 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifierOob() argument 651 passphrase, in wifiAwareCreateNetworkSpecifierOob()
|
/external/autotest/client/common_lib/cros/tendo/ |
D | privet_helper.py | 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}): argument 207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
|