Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 207) sorted by relevance

123456789

/external/curl/tests/unit/
Dunit1394.c77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
102 if(passphrase) {
103 if(strcmp(p[2], passphrase)) {
105 "for -E param '%s'\n", p[2], passphrase, p[0]);
116 if(passphrase) {
118 "for -E param '%s'\n", passphrase, p[0]);
123 if(passphrase) free(passphrase);
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
Dwps_supplicant.c312 if (new_ssid->passphrase && ssid->passphrase && in wpas_wps_remove_dup_network()
313 os_strcmp(new_ssid->passphrase, ssid->passphrase) != in wpas_wps_remove_dup_network()
328 if ((new_ssid->passphrase && !ssid->passphrase) || in wpas_wps_remove_dup_network()
329 (!new_ssid->passphrase && ssid->passphrase)) { in wpas_wps_remove_dup_network()
535 os_free(ssid->passphrase); in wpa_supplicant_wps_cred()
536 ssid->passphrase = os_malloc(cred->key_len + 1); in wpa_supplicant_wps_cred()
537 if (ssid->passphrase == NULL) in wpa_supplicant_wps_cred()
539 os_memcpy(ssid->passphrase, cred->key, cred->key_len); in wpa_supplicant_wps_cred()
540 ssid->passphrase[cred->key_len] = '\0'; in wpa_supplicant_wps_cred()
1998 if (ssid->passphrase) { in wpas_wps_network_to_cred()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
/external/autotest/client/cros/scripts/
Dwifi53 def configure(ssid, security, passphrase): argument
56 if passphrase is not None:
57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
184 passphrase = None
187 passphrase = args[2]
190 return configure(ssid, security, passphrase)
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/external/syslinux/gpxe/src/net/80211/
Dwpa_psk.c50 char passphrase[64+1]; in wpa_psk_start() local
56 &net80211_key_setting, passphrase, in wpa_psk_start()
65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ), in wpa_psk_start()
69 passphrase ); in wpa_psk_start()
/external/google-tv-pairing-protocol/cpp/src/polo/util/
Dcertificateutil.cc55 std::string passphrase) { in PKEYFromPEM() argument
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); in PKEYFromPEM()
64 std::string passphrase) { in PKEYToPEM() argument
67 &passphrase[0]); in PKEYToPEM()
Dcertificateutil.h47 std::string passphrase);
54 std::string passphrase);
/external/autotest/server/brillo/
Dhost_utils.py53 def connect_to_ssid(host, ssid, passphrase): argument
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
/external/syslinux/gpxe/src/crypto/
Dsha1extra.c94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len, in pbkdf2_sha1_f() argument
108 memcpy ( pass, passphrase, pass_len ); in pbkdf2_sha1_f()
145 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len, in pbkdf2_sha1() argument
154 pbkdf2_sha1_f ( passphrase, pass_len, salt, salt_len, in pbkdf2_sha1()
/external/autotest/server/site_tests/brillo_PingTest/
Dbrillo_PingTest.py26 def run_once(self, host=None, ssid=None, passphrase=None, argument
44 passphrase = global_config.global_config.get_config_value(
48 (ssid, passphrase))
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/
Dbrillo_WifiInterfaceTest.py45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, argument
62 passphrase = global_config.global_config.get_config_value(
64 with host_utils.connect_to_ssid(host, ssid, passphrase):
/external/ImageMagick/MagickCore/
Dcipher.c538 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
546 if (passphrase == (const char *) NULL) in DecipherImage()
548 passkey=StringToStringInfo(passphrase); in DecipherImage()
748 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
756 if (passphrase == (const char *) NULL) in EncipherImage()
758 passkey=StringToStringInfo(passphrase); in EncipherImage()
1107 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
1115 (void) passphrase; in DecipherImage()
1163 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
1171 (void) passphrase; in EncipherImage()
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowWifiP2pGroup.java19 public void setPassphrase(String passphrase) { in setPassphrase() argument
20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase); in setPassphrase()
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c434 char *passphrase; in decode_tunnel_passwords() local
442 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
449 if (passphrase == NULL) in decode_tunnel_passwords()
468 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
476 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
487 os_free(passphrase); in decode_tunnel_passwords()
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_datatypes.py234 def __init__(self, guid, passphrase=None, autoconnect=None): argument
246 self.passphrase = passphrase
/external/f2fs-tools/tools/
Df2fscrypt.c450 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
454 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
478 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
480 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
513 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
520 p = fgets(passphrase, len, stdin); in get_passphrase()
527 p = strrchr(passphrase, '\n'); in get_passphrase()
529 p = passphrase + len - 1; in get_passphrase()
/external/e2fsprogs/misc/
De4crypt.c405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
409 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
468 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
475 p = fgets(passphrase, len, stdin); in get_passphrase()
482 p = strrchr(passphrase, '\n'); in get_passphrase()
484 p = passphrase + len - 1; in get_passphrase()
/external/testng/
DREADME.dev33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy
36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
/external/freetype/docs/
Drelease104 unset passphrase
106 PATH=/empty echo -n "Enter GPG passphrase: "
108 read -r passphrase
124 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
DWifiAwareManagerFacade.java128 if (ns.passphrase != null) { in getJsonString()
129 j.put(NS_KEY_PASSPHRASE, ns.passphrase); in getJsonString()
143 String passphrase = null; in getNetworkSpecifier() local
167 passphrase = j.getString((NS_KEY_PASSPHRASE)); in getNetworkSpecifier()
171 passphrase, Process.myUid()); in getNetworkSpecifier()
567 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifier() argument
601 passphrase, in wifiAwareCreateNetworkSpecifier()
619 @RpcOptional String passphrase, in wifiAwareCreateNetworkSpecifierOob() argument
651 passphrase, in wifiAwareCreateNetworkSpecifierOob()
/external/autotest/client/common_lib/cros/tendo/
Dprivet_helper.py199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}): argument
207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}

123456789