/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 25 char *ssid, *passphrase, buf[64], *pos; local 28 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 29 "\nIf passphrase is left out, it will be read from " 37 passphrase = argv[2]; 39 printf("# reading passphrase from stdin\n"); 41 printf("Failed to read passphrase\n"); 53 passphrase = buf; 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
config_ssid.h | 131 * passphrase - WPA ASCII passphrase 133 * If this is set, psk will be generated using the SSID and passphrase 134 * configured for the network. ASCII passphrase must be between 8 and 137 char *passphrase; member in struct:wpa_ssid 279 * be set (either directly or using ASCII passphrase).
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
config_ssid.h | 134 * passphrase - WPA ASCII passphrase 136 * If this is set, psk will be generated using the SSID and passphrase 137 * configured for the network. ASCII passphrase must be between 8 and 140 char *passphrase; member in struct:wpa_ssid 289 * be set (either directly or using ASCII passphrase).
|
/external/openssh/contrib/ |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
/external/openssh/ |
sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; local 251 * load the private key. Try first with empty passphrase; if it 252 * fails, ask for a passphrase. 261 "Enter passphrase for RSA key '%.100s': ", comment); 263 passphrase = read_passphrase(buf, 0); 264 if (strcmp(passphrase, "") != 0) { 266 authfile, passphrase, NULL, NULL); 269 debug2("no passphrase given, try next key"); 272 memset(passphrase, 0, strlen(passphrase)); [all...] |
authfile.c | 7 * for reading the passphrase from the user. 80 * passphrase. The identification of the blob (lowest 64 bits of n) will 82 * passphrase. 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, 96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 99 cipher_num = (strcmp(passphrase, "") == 0) ? 107 /* Put checkbytes for checking passphrase validity. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 184 error("passphrase too short: have %d bytes, need > 4", len) [all...] |
ssh-keygen.c | 61 * Flag indicating that we just want to change the passphrase. This can be 94 /* This is set to the passphrase if given on the command line. */ 97 /* This is set to the new passphrase if given on the command line. */ 247 pass = read_passphrase("Enter passphrase: ", 1174 * Perform changing a passphrase. The argument is the passwd structure 1191 /* Try to load the file with empty passphrase. */ 1198 read_passphrase("Enter old passphrase: ", 1205 printf("Bad passphrase.\n"); 1211 /* Ask the new passphrase (twice). */ 1217 read_passphrase("Enter new passphrase (empty for no 1293 char new_comment[1024], *comment, *passphrase; local [all...] |
sshconnect2.c | 1317 char prompt[300], *passphrase; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 251 char *passphrase; member in struct:passphrase_test 331 printf("PBKDF2-SHA1 Passphrase test cases:\n"); 335 pbkdf2_sha1(test->passphrase,
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 451 char *passphrase; local 472 passphrase = radius_msg_get_tunnel_password( 477 cache->has_psk = passphrase != NULL; 478 if (passphrase != NULL) { 479 /* passphrase does not contain the NULL termination. 483 os_memcpy(strpassphrase, passphrase, 491 os_free(passphrase);
|
/external/chromium/chrome/browser/ui/webui/options/ |
sync_setup_handler.cc | 127 !result->GetString("passphrase", &config->secondary_passphrase)) 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { 139 return result->GetString("passphrase", passphrase); 144 std::string* passphrase) { 151 result->GetString("passphrase", passphrase); 288 web_ui_->RegisterMessageCallback("Passphrase", 321 StringValue page("passphrase"); 422 std::string passphrase; 448 std::string passphrase; local [all...] |
/external/chromium/chrome/browser/chromeos/status/ |
network_menu.h | 43 // Remembered passphrase. 44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo 45 // true if the network requires a passphrase. 60 const std::string& passphrase,
|
/external/chromium/chrome/browser/chromeos/options/ |
wifi_config_view.cc | 303 // If security is not none, also enforce passphrase is non empty. 313 // if the network requires a passphrase, make sure it is the right length. 559 // Passphrase 567 const std::string passphrase = GetPassphrase(); local 568 if (passphrase != wifi->passphrase()) 569 wifi->SetPassphrase(passphrase); 726 // Passphrase input 737 // Disable passphrase input initially for other network. 880 // Passphrase [all...] |
/external/chromium/chrome/browser/ui/webui/options/chromeos/ |
internet_options_handler.cc | 787 std::string passphrase; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 89 * passphrase - WPA2-Personal passphrase for the group (GO only) 91 char passphrase[64]; member in struct:p2p_go_neg_results [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver.h | 272 * passphrase - RSN passphrase for PSK 276 * the 8..63 character ASCII passphrase, if available. Please note that 277 * this can be %NULL if passphrase was not used to generate the PSK. In 280 const char *passphrase; member in struct:wpa_driver_associate_params 283 * psk - RSN PSK (alternative for passphrase for PSK) [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-jsch.jar | |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.h | 671 const std::string& passphrase() const { return passphrase_; } function in class:chromeos::WifiNetwork 693 void SetPassphrase(const std::string& passphrase); 705 void SetEAPPassphrase(const std::string& passphrase); 715 // Return true if a passphrase or other input is required to connect. 731 void set_passphrase(const std::string& passphrase) { 732 passphrase_ = passphrase; 758 // Tells flimflam to save passphrase and EAP credentials to disk. 762 // Passphrase set by user (stored for UI). [all...] |
network_library.cc | 117 const char* kPassphraseProperty = "Passphrase"; 320 const char* kErrorBadPassphrase = "bad-passphrase"; 329 const char* kErrorPassphraseRequiredMsg = "Passphrase required"; 1858 std::string passphrase; local 4323 std::string passphrase; member in struct:chromeos::NetworkLibraryImpl::ConnectData [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 455 * passphrase - RSN passphrase for PSK 459 * the 8..63 character ASCII passphrase, if available. Please note that 460 * this can be %NULL if passphrase was not used to generate the PSK. In 463 const char *passphrase; member in struct:wpa_driver_associate_params 466 * psk - RSN PSK (alternative for passphrase for PSK) [all...] |