Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 232) sorted by relevance

12345678910

/external/curl/tests/unit/
Dunit1394.c80 char *certname, *passphrase; variable
82 parse_cert_parameter(p[0], &certname, &passphrase);
105 if(passphrase) {
106 if(strcmp(p[2], passphrase)) {
108 "for -E param '%s'\n", p[2], passphrase, p[0]);
119 if(passphrase) {
121 "for -E param '%s'\n", passphrase, p[0]);
126 if(passphrase) free(passphrase);
/external/openssh/contrib/
Dgnome-ssh-askpass2.c88 char *passphrase, *local; in passphrase_dialog() local
169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog()
171 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog()
178 puts(passphrase); in passphrase_dialog()
183 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog()
184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
185 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
186 g_free(passphrase); in passphrase_dialog()
Dgnome-ssh-askpass1.c70 char *passphrase; in passphrase_dialog() local
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog()
131 puts(passphrase); in passphrase_dialog()
134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog()
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_passphrase.c19 char *ssid, *passphrase, buf[64], *pos; in main() local
32 passphrase = argv[2]; in main()
48 passphrase = buf; in main()
51 len = os_strlen(passphrase); in main()
56 if (has_ctrl_char((u8 *) passphrase, len)) { in main()
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
65 printf("\t#psk=\"%s\"\n", passphrase); in main()
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
10 00:00:00:00:00:00 secret passphrase
11 00:11:22:33:44:55 another passphrase
13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
14 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
15 00:00:00:00:00:00 another passphrase for all STAs
Dhostapd.radius_clients2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
/external/wpa_supplicant_8/src/crypto/
Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
/external/autotest/client/cros/scripts/
Dwifi53 def configure(ssid, security, passphrase): argument
56 if passphrase is not None:
57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
184 passphrase = None
187 passphrase = args[2]
190 return configure(ssid, security, passphrase)
/external/openssh/
Dauthfile.c77 const char *passphrase, const char *comment, in sshkey_save_private() argument
85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private()
211 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument
235 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type()
242 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument
256 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd()
268 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument
291 (r = sshkey_parse_private_fileblob(buffer, passphrase, keyp, in sshkey_load_private()
453 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument
476 passphrase, &key, NULL, perm_ok)) != 0 || in sshkey_load_private_cert()
Dkey.c294 key_save_private(Key *key, const char *filename, const char *passphrase, in key_save_private() argument
300 if ((r = sshkey_save_private(key, filename, passphrase, comment, in key_save_private()
360 key_load_private(const char *path, const char *passphrase, in key_load_private() argument
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { in key_load_private()
380 key_load_private_cert(int type, const char *filename, const char *passphrase, in key_load_private_cert() argument
386 if ((r = sshkey_load_private_cert(type, filename, passphrase, in key_load_private_cert()
401 key_load_private_type(int type, const char *filename, const char *passphrase, in key_load_private_type() argument
407 if ((r = sshkey_load_private_type(type, filename, passphrase, in key_load_private_type()
Dsshconnect1.c224 char buf[300], *passphrase = NULL, *comment, *authfile; in try_rsa_authentication() local
277 passphrase = read_passphrase(buf, 0); in try_rsa_authentication()
278 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication()
280 authfile, passphrase, NULL, NULL); in try_rsa_authentication()
293 maybe_add_key_to_agent(authfile, private, comment, passphrase); in try_rsa_authentication()
295 if (passphrase != NULL) { in try_rsa_authentication()
296 explicit_bzero(passphrase, strlen(passphrase)); in try_rsa_authentication()
297 free(passphrase); in try_rsa_authentication()
Dssh-add.020 If any file requires a passphrase, ssh-add asks for the passphrase from
21 the user. The passphrase is read from the user's tty. ssh-add retries
22 the last passphrase if multiple identity files are given.
77 If ssh-add needs a passphrase, it will read the passphrase from
82 read the passphrase. This is particularly useful when calling
Dssh-keygen.013 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
58 name but M-bM-^@M-^\.pubM-bM-^@M-^] appended. The program also asks for a passphrase. The
59 passphrase may be empty to indicate no passphrase (host keys must have an
60 empty passphrase), or it may be a string of arbitrary length. A
61 passphrase is similar to a password, except it can be a phrase with a
67 alphanumeric characters. The passphrase can be changed later by using
70 There is no way to recover a lost passphrase. If the passphrase is lost
87 default key file path, an empty passphrase, default bits for the
95 used. Higher numbers result in slower passphrase verification
122 the file containing the private keys, for the passphrase if the
[all …]
/external/openssh/contrib/cygwin/
Dssh-user-config37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
/external/autotest/server/brillo/
Dhost_utils.py53 def connect_to_ssid(host, ssid, passphrase): argument
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
/external/autotest/server/site_tests/brillo_PingTest/
Dbrillo_PingTest.py26 def run_once(self, host=None, ssid=None, passphrase=None, argument
44 passphrase = global_config.global_config.get_config_value(
48 (ssid, passphrase))
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/
Dbrillo_WifiInterfaceTest.py45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, argument
62 passphrase = global_config.global_config.get_config_value(
64 with host_utils.connect_to_ssid(host, ssid, passphrase):
/external/ImageMagick/MagickCore/
Dcipher.c537 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
545 if (passphrase == (const char *) NULL) in DecipherImage()
547 passkey=StringToStringInfo(passphrase); in DecipherImage()
747 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
755 if (passphrase == (const char *) NULL) in EncipherImage()
757 passkey=StringToStringInfo(passphrase); in EncipherImage()
1106 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument
1114 (void) passphrase; in DecipherImage()
1162 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument
1170 (void) passphrase; in EncipherImage()
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.2/
Dp2p_iface.cpp155 const std::string& passphrase) in addGroupClientNetwork() argument
188 wpa_network->passphrase = dup_binstr(passphrase.c_str(), passphrase.length()); in addGroupClientNetwork()
189 if (wpa_network->passphrase == NULL) { in addGroupClientNetwork()
325 const std::string& passphrase) in joinGroup() argument
335 wpa_s, group_owner_bssid, ssid, passphrase); in joinGroup()
360 std::string passphrase = ""; in notifyGroupJoinFailure() local
362 wpa_s, zero_addr, ssid, passphrase); in notifyGroupJoinFailure()
843 const hidl_vec<uint8_t>& ssid, const hidl_string& passphrase, in addGroup_1_2() argument
850 ssid, passphrase, persistent, freq, peer_address, join); in addGroup_1_2()
1623 const std::vector<uint8_t>& ssid, const std::string& passphrase, in addGroup_1_2Internal() argument
[all …]
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowWifiP2pGroup.java19 public void setPassphrase(String passphrase) { in setPassphrase() argument
20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase); in setPassphrase()
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c445 char *passphrase; in decode_tunnel_passwords() local
453 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords()
460 if (passphrase == NULL) in decode_tunnel_passwords()
479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
487 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
498 os_free(passphrase); in decode_tunnel_passwords()
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_datatypes.py234 def __init__(self, guid, passphrase=None, autoconnect=None): argument
246 self.passphrase = passphrase
/external/e2fsprogs/misc/
De4crypt.c405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument
409 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512()
433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512()
435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512()
468 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument
475 p = fgets(passphrase, len, stdin); in get_passphrase()
482 p = strrchr(passphrase, '\n'); in get_passphrase()
484 p = passphrase + len - 1; in get_passphrase()
/external/grpc-grpc-java/buildscripts/kokoro/
Dupload_artifacts.sh58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \

12345678910