/external/curl/tests/unit/ |
D | unit1394.c | 80 char *certname, *passphrase; variable 82 parse_cert_parameter(p[0], &certname, &passphrase); 105 if(passphrase) { 106 if(strcmp(p[2], passphrase)) { 108 "for -E param '%s'\n", p[2], passphrase, p[0]); 119 if(passphrase) { 121 "for -E param '%s'\n", passphrase, p[0]); 126 if(passphrase) free(passphrase);
|
/external/openssh/contrib/ |
D | gnome-ssh-askpass2.c | 88 char *passphrase, *local; in passphrase_dialog() local 169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); in passphrase_dialog() 171 local = g_locale_from_utf8(passphrase, strlen(passphrase), in passphrase_dialog() 178 puts(passphrase); in passphrase_dialog() 183 memset(passphrase, '\b', strlen(passphrase)); in passphrase_dialog() 184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog() 185 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 186 g_free(passphrase); in passphrase_dialog()
|
D | gnome-ssh-askpass1.c | 70 char *passphrase; in passphrase_dialog() local 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); in passphrase_dialog() 131 puts(passphrase); in passphrase_dialog() 134 memset(passphrase, '\0', strlen(passphrase)); in passphrase_dialog() 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); in passphrase_dialog()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_passphrase.c | 19 char *ssid, *passphrase, buf[64], *pos; in main() local 32 passphrase = argv[2]; in main() 48 passphrase = buf; in main() 51 len = os_strlen(passphrase); in main() 56 if (has_ctrl_char((u8 *) passphrase, len)) { in main() 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 65 printf("\t#psk=\"%s\"\n", passphrase); in main()
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 10 00:00:00:00:00:00 secret passphrase 11 00:11:22:33:44:55 another passphrase 13 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 14 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 15 00:00:00:00:00:00 another passphrase for all STAs
|
D | hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, in pbkdf2_sha1() argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, in pbkdf2_sha1()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/autotest/client/cros/scripts/ |
D | wifi | 53 def configure(ssid, security, passphrase): argument 56 if passphrase is not None: 57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 184 passphrase = None 187 passphrase = args[2] 190 return configure(ssid, security, passphrase)
|
/external/openssh/ |
D | authfile.c | 77 const char *passphrase, const char *comment, in sshkey_save_private() argument 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, in sshkey_save_private() 211 sshkey_load_private_type(int type, const char *filename, const char *passphrase, in sshkey_load_private_type() argument 235 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); in sshkey_load_private_type() 242 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, in sshkey_load_private_type_fd() argument 256 passphrase, keyp, commentp)) != 0) in sshkey_load_private_type_fd() 268 sshkey_load_private(const char *filename, const char *passphrase, in sshkey_load_private() argument 291 (r = sshkey_parse_private_fileblob(buffer, passphrase, keyp, in sshkey_load_private() 453 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, in sshkey_load_private_cert() argument 476 passphrase, &key, NULL, perm_ok)) != 0 || in sshkey_load_private_cert()
|
D | key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, in key_save_private() argument 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, in key_save_private() 360 key_load_private(const char *path, const char *passphrase, in key_load_private() argument 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { in key_load_private() 380 key_load_private_cert(int type, const char *filename, const char *passphrase, in key_load_private_cert() argument 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, in key_load_private_cert() 401 key_load_private_type(int type, const char *filename, const char *passphrase, in key_load_private_type() argument 407 if ((r = sshkey_load_private_type(type, filename, passphrase, in key_load_private_type()
|
D | sshconnect1.c | 224 char buf[300], *passphrase = NULL, *comment, *authfile; in try_rsa_authentication() local 277 passphrase = read_passphrase(buf, 0); in try_rsa_authentication() 278 if (strcmp(passphrase, "") != 0) { in try_rsa_authentication() 280 authfile, passphrase, NULL, NULL); in try_rsa_authentication() 293 maybe_add_key_to_agent(authfile, private, comment, passphrase); in try_rsa_authentication() 295 if (passphrase != NULL) { in try_rsa_authentication() 296 explicit_bzero(passphrase, strlen(passphrase)); in try_rsa_authentication() 297 free(passphrase); in try_rsa_authentication()
|
D | ssh-add.0 | 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries 22 the last passphrase if multiple identity files are given. 77 If ssh-add needs a passphrase, it will read the passphrase from 82 read the passphrase. This is particularly useful when calling
|
D | ssh-keygen.0 | 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] 58 name but M-bM-^@M-^\.pubM-bM-^@M-^] appended. The program also asks for a passphrase. The 59 passphrase may be empty to indicate no passphrase (host keys must have an 60 empty passphrase), or it may be a string of arbitrary length. A 61 passphrase is similar to a password, except it can be a phrase with a 67 alphanumeric characters. The passphrase can be changed later by using 70 There is no way to recover a lost passphrase. If the passphrase is lost 87 default key file path, an empty passphrase, default bits for the 95 used. Higher numbers result in slower passphrase verification 122 the file containing the private keys, for the passphrase if the [all …]
|
/external/openssh/contrib/cygwin/ |
D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1
|
/external/autotest/server/brillo/ |
D | host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): argument 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
/external/autotest/server/site_tests/brillo_PingTest/ |
D | brillo_PingTest.py | 26 def run_once(self, host=None, ssid=None, passphrase=None, argument 44 passphrase = global_config.global_config.get_config_value( 48 (ssid, passphrase))
|
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/ |
D | brillo_WifiInterfaceTest.py | 45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, argument 62 passphrase = global_config.global_config.get_config_value( 64 with host_utils.connect_to_ssid(host, ssid, passphrase):
|
/external/ImageMagick/MagickCore/ |
D | cipher.c | 537 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 545 if (passphrase == (const char *) NULL) in DecipherImage() 547 passkey=StringToStringInfo(passphrase); in DecipherImage() 747 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 755 if (passphrase == (const char *) NULL) in EncipherImage() 757 passkey=StringToStringInfo(passphrase); in EncipherImage() 1106 const char *passphrase,ExceptionInfo *exception) in DecipherImage() argument 1114 (void) passphrase; in DecipherImage() 1162 const char *passphrase,ExceptionInfo *exception) in EncipherImage() argument 1170 (void) passphrase; in EncipherImage()
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.2/ |
D | p2p_iface.cpp | 155 const std::string& passphrase) in addGroupClientNetwork() argument 188 wpa_network->passphrase = dup_binstr(passphrase.c_str(), passphrase.length()); in addGroupClientNetwork() 189 if (wpa_network->passphrase == NULL) { in addGroupClientNetwork() 325 const std::string& passphrase) in joinGroup() argument 335 wpa_s, group_owner_bssid, ssid, passphrase); in joinGroup() 360 std::string passphrase = ""; in notifyGroupJoinFailure() local 362 wpa_s, zero_addr, ssid, passphrase); in notifyGroupJoinFailure() 843 const hidl_vec<uint8_t>& ssid, const hidl_string& passphrase, in addGroup_1_2() argument 850 ssid, passphrase, persistent, freq, peer_address, join); in addGroup_1_2() 1623 const std::vector<uint8_t>& ssid, const std::string& passphrase, in addGroup_1_2Internal() argument [all …]
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowWifiP2pGroup.java | 19 public void setPassphrase(String passphrase) { in setPassphrase() argument 20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase); in setPassphrase()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 445 char *passphrase; in decode_tunnel_passwords() local 453 passphrase = radius_msg_get_tunnel_password( in decode_tunnel_passwords() 460 if (passphrase == NULL) in decode_tunnel_passwords() 479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 487 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 498 os_free(passphrase); in decode_tunnel_passwords()
|
/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_datatypes.py | 234 def __init__(self, guid, passphrase=None, autoconnect=None): argument 246 self.passphrase = passphrase
|
/external/e2fsprogs/misc/ |
D | e4crypt.c | 405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, in pbkdf2_sha512() argument 409 size_t passphrase_size = strlen(passphrase); in pbkdf2_sha512() 433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); in pbkdf2_sha512() 435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); in pbkdf2_sha512() 468 static void get_passphrase(char *passphrase, int len) in get_passphrase() argument 475 p = fgets(passphrase, len, stdin); in get_passphrase() 482 p = strrchr(passphrase, '\n'); in get_passphrase() 484 p = passphrase + len - 1; in get_passphrase()
|
/external/grpc-grpc-java/buildscripts/kokoro/ |
D | upload_artifacts.sh | 58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
|