HomeSort by relevance Sort by last modified time
    Searched defs:passphrase (Results 1 - 22 of 22) sorted by null

  /external/curl/tests/unit/
unit1394.c 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
80 char *certname, *passphrase; variable
82 parse_cert_parameter(p[0], &certname, &passphrase);
105 if(passphrase) {
106 if(strcmp(p[2], passphrase)) {
107 printf("expected passphrase '%s' but got '%s'"
108 "for -E param '%s'\n", p[2], passphrase, p[0]);
113 printf("expected passphrase '%s' but got NULL "
119 if(passphrase) {
120 printf("expected passphrase NULL but got '%s'
126 if(passphrase) free(passphrase); variable
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
23 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
24 "\nIf passphrase is left out, it will be read from "
32 passphrase = argv[2];
34 printf("# reading passphrase from stdin\n");
36 printf("Failed to read passphrase\n");
48 passphrase = buf;
51 len = os_strlen(passphrase);
53 printf("Passphrase must be 8..63 characters\n")
    [all...]
config_ssid.h 181 * passphrase - WPA ASCII passphrase
183 * If this is set, psk will be generated using the SSID and passphrase
184 * configured for the network. ASCII passphrase must be between 8 and
187 char *passphrase; member in struct:wpa_ssid
193 * passphrase value is used if this separate parameter is not used, but
194 * passphrase follows the WPA-PSK constraints (8..63 characters) even
208 * ext_psk - PSK/passphrase name in external storage
210 * If this is set, PSK/passphrase will be fetched from external storage
216 * mem_only_psk - Whether to keep PSK/passphrase only in memor
    [all...]
  /external/openssh/contrib/
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
88 char *passphrase, *local; local
168 /* Report passphrase if user selected OK */
169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
171 local = g_locale_from_utf8(passphrase, strlen(passphrase),
178 puts(passphrase);
182 /* Zero passphrase in memory */
183 memset(passphrase, '\b', strlen(passphrase));
184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
  /cts/tests/tests/net/src/android/net/wifi/p2p/cts/
WifiP2pConfigTest.java 42 assertTrue(config.passphrase.equals(TEST_PASSPHRASE));
58 assertTrue(config.passphrase.equals(TEST_PASSPHRASE));
  /external/openssh/
sshconnect1.c 224 char buf[300], *passphrase = NULL, *comment, *authfile; local
265 * load the private key. Try first with empty passphrase; if it
266 * fails, ask for a passphrase.
275 "Enter passphrase for RSA key '%.100s': ", comment);
277 passphrase = read_passphrase(buf, 0);
278 if (strcmp(passphrase, "") != 0) {
280 authfile, passphrase, NULL, NULL);
283 debug2("no passphrase given, try next key");
288 debug2("bad passphrase given, try again...");
293 maybe_add_key_to_agent(authfile, private, comment, passphrase);
    [all...]
ssh-keygen.c 76 * Flag indicating that we just want to change the passphrase. This can be
112 /* This is set to the passphrase if given on the command line. */
115 /* This is set to the new passphrase if given on the command line. */
291 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN);
1404 char new_comment[1024], *comment, *passphrase; local
    [all...]
sshconnect2.c 1232 char prompt[300], *passphrase, *comment local
    [all...]
sshkey.c 3515 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 445 char *passphrase; local
453 passphrase = radius_msg_get_tunnel_password(
457 * Passphrase is NULL iff there is no i-th Tunnel-Password
460 if (passphrase == NULL)
473 * passphrase does not contain the NULL termination.
479 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
487 os_memcpy(psk->passphrase, passphrase,
498 os_free(passphrase);
ap_config.h 144 char passphrase[MAX_PASSPHRASE_LEN + 1]; member in struct:hostapd_sta_wpa_psk_short
  /external/curl/src/
tool_getparam.c 323 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon.
332 char **passphrase)
339 *passphrase = NULL;
348 * means no passphrase was given and no characters escaped */
416 *passphrase = strdup(param_place);
428 char *certname, *passphrase; local
429 parse_cert_parameter(nextarg, &certname, &passphrase);
432 if(passphrase) {
434 *password = passphrase;
    [all...]
  /external/ImageMagick/coders/
pdf.c 736 passphrase[MagickPathExtent];
738 (void) FormatLocaleString(passphrase,MagickPathExtent,
740 (void) ConcatenateMagickString(options,passphrase,MagickPathExtent);
730 passphrase[MagickPathExtent]; local
    [all...]
  /external/curl/lib/
ssh.h 119 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
  /external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
WifiAwareManagerFacade.java 112 private static final String NS_KEY_PASSPHRASE = "passphrase";
130 if (ns.passphrase != null) {
131 j.put(NS_KEY_PASSPHRASE, ns.passphrase);
151 String passphrase = null; local
176 passphrase = j.getString(NS_KEY_PASSPHRASE);
186 passphrase, port, transportProtocol, Process.myUid());
580 @RpcParameter(name = "passphrase",
581 description = "Passphrase of the data-path. Optional, can be empty/null.")
582 @RpcOptional String passphrase,
618 passphrase,
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 1073 char *passphrase; member in struct:passphrase_test
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p.h 132 * passphrase - WPA2-Personal passphrase for the group (GO only)
134 char passphrase[64]; member in struct:p2p_go_neg_results
576 * passphrase_len - Passphrase length (8..63)
578 * This parameter controls the length of the random passphrase that is
    [all...]
p2p_i.h 362 * passphrase - WPA2-Personal passphrase for GO Negotiation (if local end will be GO)
364 char passphrase[MAX_PASSPHRASE_LEN + 1]; member in struct:p2p_data
367 * passphrase_set - Whether passphrase is already set for GO Negotiation
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.2/
p2p_iface.cpp 155 const std::string& passphrase)
188 wpa_network->passphrase = dup_binstr(passphrase.c_str(), passphrase.length());
189 if (wpa_network->passphrase == NULL) {
325 const std::string& passphrase)
335 wpa_s, group_owner_bssid, ssid, passphrase);
360 std::string passphrase = ""; local
362 wpa_s, zero_addr, ssid, passphrase);
843 const hidl_vec<uint8_t>& ssid, const hidl_string& passphrase,
    [all...]
  /external/wpa_supplicant_8/src/common/
dpp.h 170 char *passphrase; member in struct:dpp_configuration
232 char passphrase[64]; member in struct:dpp_authentication
  /external/wpa_supplicant_8/src/drivers/
driver.h 931 * passphrase - RSN passphrase for PSK
935 * is the 8..63 character ASCII passphrase, if available. Please note
936 * that this can be %NULL if passphrase was not used to generate the
939 const char *passphrase; member in struct:wpa_driver_associate_params
942 * psk - RSN PSK (alternative for passphrase for PSK)
    [all...]

Completed in 996 milliseconds