HomeSort by relevance Sort by last modified time
    Searched defs:passphrase (Results 1 - 22 of 22) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
25 char *ssid, *passphrase, buf[64], *pos; local
28 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
29 "\nIf passphrase is left out, it will be read from "
37 passphrase = argv[2];
39 printf("# reading passphrase from stdin\n");
41 printf("Failed to read passphrase\n");
53 passphrase = buf;
56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
config_ssid.h 131 * passphrase - WPA ASCII passphrase
133 * If this is set, psk will be generated using the SSID and passphrase
134 * configured for the network. ASCII passphrase must be between 8 and
137 char *passphrase; member in struct:wpa_ssid
279 * be set (either directly or using ASCII passphrase).
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
config_ssid.h 134 * passphrase - WPA ASCII passphrase
136 * If this is set, psk will be generated using the SSID and passphrase
137 * configured for the network. ASCII passphrase must be between 8 and
140 char *passphrase; member in struct:wpa_ssid
289 * be set (either directly or using ASCII passphrase).
  /external/openssh/contrib/
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
  /external/openssh/
sshconnect1.c 210 char buf[300], *passphrase, *comment, *authfile; local
251 * load the private key. Try first with empty passphrase; if it
252 * fails, ask for a passphrase.
261 "Enter passphrase for RSA key '%.100s': ", comment);
263 passphrase = read_passphrase(buf, 0);
264 if (strcmp(passphrase, "") != 0) {
266 authfile, passphrase, NULL, NULL);
269 debug2("no passphrase given, try next key");
272 memset(passphrase, 0, strlen(passphrase));
    [all...]
authfile.c 7 * for reading the passphrase from the user.
80 * passphrase. The identification of the blob (lowest 64 bits of n) will
82 * passphrase.
85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase,
96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
99 cipher_num = (strcmp(passphrase, "") == 0) ?
107 /* Put checkbytes for checking passphrase validity. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
184 error("passphrase too short: have %d bytes, need > 4", len)
    [all...]
ssh-keygen.c 61 * Flag indicating that we just want to change the passphrase. This can be
94 /* This is set to the passphrase if given on the command line. */
97 /* This is set to the new passphrase if given on the command line. */
247 pass = read_passphrase("Enter passphrase: ",
1174 * Perform changing a passphrase. The argument is the passwd structure
1191 /* Try to load the file with empty passphrase. */
1198 read_passphrase("Enter old passphrase: ",
1205 printf("Bad passphrase.\n");
1211 /* Ask the new passphrase (twice). */
1217 read_passphrase("Enter new passphrase (empty for no
1293 char new_comment[1024], *comment, *passphrase; local
    [all...]
sshconnect2.c 1317 char prompt[300], *passphrase; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_sha1.c 251 char *passphrase; member in struct:passphrase_test
331 printf("PBKDF2-SHA1 Passphrase test cases:\n");
335 pbkdf2_sha1(test->passphrase,
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 451 char *passphrase; local
472 passphrase = radius_msg_get_tunnel_password(
477 cache->has_psk = passphrase != NULL;
478 if (passphrase != NULL) {
479 /* passphrase does not contain the NULL termination.
483 os_memcpy(strpassphrase, passphrase,
491 os_free(passphrase);
  /external/chromium/chrome/browser/ui/webui/options/
sync_setup_handler.cc 127 !result->GetString("passphrase", &config->secondary_passphrase))
133 bool GetPassphrase(const std::string& json, std::string* passphrase) {
139 return result->GetString("passphrase", passphrase);
144 std::string* passphrase) {
151 result->GetString("passphrase", passphrase);
288 web_ui_->RegisterMessageCallback("Passphrase",
321 StringValue page("passphrase");
422 std::string passphrase;
448 std::string passphrase; local
    [all...]
  /external/chromium/chrome/browser/chromeos/status/
network_menu.h 43 // Remembered passphrase.
44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo
45 // true if the network requires a passphrase.
60 const std::string& passphrase,
  /external/chromium/chrome/browser/chromeos/options/
wifi_config_view.cc 303 // If security is not none, also enforce passphrase is non empty.
313 // if the network requires a passphrase, make sure it is the right length.
559 // Passphrase
567 const std::string passphrase = GetPassphrase(); local
568 if (passphrase != wifi->passphrase())
569 wifi->SetPassphrase(passphrase);
726 // Passphrase input
737 // Disable passphrase input initially for other network.
880 // Passphrase
    [all...]
  /external/chromium/chrome/browser/ui/webui/options/chromeos/
internet_options_handler.cc 787 std::string passphrase; local
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p.h 89 * passphrase - WPA2-Personal passphrase for the group (GO only)
91 char passphrase[64]; member in struct:p2p_go_neg_results
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver.h 272 * passphrase - RSN passphrase for PSK
276 * the 8..63 character ASCII passphrase, if available. Please note that
277 * this can be %NULL if passphrase was not used to generate the PSK. In
280 const char *passphrase; member in struct:wpa_driver_associate_params
283 * psk - RSN PSK (alternative for passphrase for PSK)
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
ant-jsch.jar 
  /external/chromium/chrome/browser/chromeos/cros/
network_library.h 671 const std::string& passphrase() const { return passphrase_; } function in class:chromeos::WifiNetwork
693 void SetPassphrase(const std::string& passphrase);
705 void SetEAPPassphrase(const std::string& passphrase);
715 // Return true if a passphrase or other input is required to connect.
731 void set_passphrase(const std::string& passphrase) {
732 passphrase_ = passphrase;
758 // Tells flimflam to save passphrase and EAP credentials to disk.
762 // Passphrase set by user (stored for UI).
    [all...]
network_library.cc 117 const char* kPassphraseProperty = "Passphrase";
320 const char* kErrorBadPassphrase = "bad-passphrase";
329 const char* kErrorPassphraseRequiredMsg = "Passphrase required";
1858 std::string passphrase; local
4323 std::string passphrase; member in struct:chromeos::NetworkLibraryImpl::ConnectData
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver.h 455 * passphrase - RSN passphrase for PSK
459 * the 8..63 character ASCII passphrase, if available. Please note that
460 * this can be %NULL if passphrase was not used to generate the PSK. In
463 const char *passphrase; member in struct:wpa_driver_associate_params
466 * psk - RSN PSK (alternative for passphrase for PSK)
    [all...]

Completed in 532 milliseconds