/external/curl/tests/unit/ |
unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 80 char *certname, *passphrase; variable 82 parse_cert_parameter(p[0], &certname, &passphrase); 105 if(passphrase) { 106 if(strcmp(p[2], passphrase)) { 107 printf("expected passphrase '%s' but got '%s'" 108 "for -E param '%s'\n", p[2], passphrase, p[0]); 113 printf("expected passphrase '%s' but got NULL " 119 if(passphrase) { 120 printf("expected passphrase NULL but got '%s' 126 if(passphrase) free(passphrase); variable [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 23 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 24 "\nIf passphrase is left out, it will be read from " 32 passphrase = argv[2]; 34 printf("# reading passphrase from stdin\n"); 36 printf("Failed to read passphrase\n"); 48 passphrase = buf; 51 len = os_strlen(passphrase); 53 printf("Passphrase must be 8..63 characters\n") [all...] |
config_ssid.h | 181 * passphrase - WPA ASCII passphrase 183 * If this is set, psk will be generated using the SSID and passphrase 184 * configured for the network. ASCII passphrase must be between 8 and 187 char *passphrase; member in struct:wpa_ssid 193 * passphrase value is used if this separate parameter is not used, but 194 * passphrase follows the WPA-PSK constraints (8..63 characters) even 208 * ext_psk - PSK/passphrase name in external storage 210 * If this is set, PSK/passphrase will be fetched from external storage 216 * mem_only_psk - Whether to keep PSK/passphrase only in memor [all...] |
/external/openssh/contrib/ |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 88 char *passphrase, *local; local 168 /* Report passphrase if user selected OK */ 169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 171 local = g_locale_from_utf8(passphrase, strlen(passphrase), 178 puts(passphrase); 182 /* Zero passphrase in memory */ 183 memset(passphrase, '\b', strlen(passphrase)); 184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
/cts/tests/tests/net/src/android/net/wifi/p2p/cts/ |
WifiP2pConfigTest.java | 42 assertTrue(config.passphrase.equals(TEST_PASSPHRASE)); 58 assertTrue(config.passphrase.equals(TEST_PASSPHRASE));
|
/external/openssh/ |
sshconnect1.c | 224 char buf[300], *passphrase = NULL, *comment, *authfile; local 265 * load the private key. Try first with empty passphrase; if it 266 * fails, ask for a passphrase. 275 "Enter passphrase for RSA key '%.100s': ", comment); 277 passphrase = read_passphrase(buf, 0); 278 if (strcmp(passphrase, "") != 0) { 280 authfile, passphrase, NULL, NULL); 283 debug2("no passphrase given, try next key"); 288 debug2("bad passphrase given, try again..."); 293 maybe_add_key_to_agent(authfile, private, comment, passphrase); [all...] |
ssh-keygen.c | 76 * Flag indicating that we just want to change the passphrase. This can be 112 /* This is set to the passphrase if given on the command line. */ 115 /* This is set to the new passphrase if given on the command line. */ 291 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN); 1404 char new_comment[1024], *comment, *passphrase; local [all...] |
sshconnect2.c | 1232 char prompt[300], *passphrase, *comment local [all...] |
sshkey.c | 3515 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 445 char *passphrase; local 453 passphrase = radius_msg_get_tunnel_password( 457 * Passphrase is NULL iff there is no i-th Tunnel-Password 460 if (passphrase == NULL) 473 * passphrase does not contain the NULL termination. 479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 487 os_memcpy(psk->passphrase, passphrase, 498 os_free(passphrase);
|
ap_config.h | 144 char passphrase[MAX_PASSPHRASE_LEN + 1]; member in struct:hostapd_sta_wpa_psk_short
|
/external/curl/src/ |
tool_getparam.c | 323 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon. 332 char **passphrase) 339 *passphrase = NULL; 348 * means no passphrase was given and no characters escaped */ 416 *passphrase = strdup(param_place); 428 char *certname, *passphrase; local 429 parse_cert_parameter(nextarg, &certname, &passphrase); 432 if(passphrase) { 434 *password = passphrase; [all...] |
/external/ImageMagick/coders/ |
pdf.c | 736 passphrase[MagickPathExtent]; 738 (void) FormatLocaleString(passphrase,MagickPathExtent, 740 (void) ConcatenateMagickString(options,passphrase,MagickPathExtent); 730 passphrase[MagickPathExtent]; local [all...] |
/external/curl/lib/ |
ssh.h | 119 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
WifiAwareManagerFacade.java | 112 private static final String NS_KEY_PASSPHRASE = "passphrase"; 130 if (ns.passphrase != null) { 131 j.put(NS_KEY_PASSPHRASE, ns.passphrase); 151 String passphrase = null; local 176 passphrase = j.getString(NS_KEY_PASSPHRASE); 186 passphrase, port, transportProtocol, Process.myUid()); 580 @RpcParameter(name = "passphrase", 581 description = "Passphrase of the data-path. Optional, can be empty/null.") 582 @RpcOptional String passphrase, 618 passphrase, [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1073 char *passphrase; member in struct:passphrase_test [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 132 * passphrase - WPA2-Personal passphrase for the group (GO only) 134 char passphrase[64]; member in struct:p2p_go_neg_results 576 * passphrase_len - Passphrase length (8..63) 578 * This parameter controls the length of the random passphrase that is [all...] |
p2p_i.h | 362 * passphrase - WPA2-Personal passphrase for GO Negotiation (if local end will be GO) 364 char passphrase[MAX_PASSPHRASE_LEN + 1]; member in struct:p2p_data 367 * passphrase_set - Whether passphrase is already set for GO Negotiation
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.2/ |
p2p_iface.cpp | 155 const std::string& passphrase) 188 wpa_network->passphrase = dup_binstr(passphrase.c_str(), passphrase.length()); 189 if (wpa_network->passphrase == NULL) { 325 const std::string& passphrase) 335 wpa_s, group_owner_bssid, ssid, passphrase); 360 std::string passphrase = ""; local 362 wpa_s, zero_addr, ssid, passphrase); 843 const hidl_vec<uint8_t>& ssid, const hidl_string& passphrase, [all...] |
/external/wpa_supplicant_8/src/common/ |
dpp.h | 170 char *passphrase; member in struct:dpp_configuration 232 char passphrase[64]; member in struct:dpp_authentication
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 931 * passphrase - RSN passphrase for PSK 935 * is the 8..63 character ASCII passphrase, if available. Please note 936 * that this can be %NULL if passphrase was not used to generate the 939 const char *passphrase; member in struct:wpa_driver_associate_params 942 * psk - RSN PSK (alternative for passphrase for PSK) [all...] |