/external/dropbear/ |
keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase, 39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
|
keyimport.c | 53 static sign_key *openssh_read(const char *filename, char *passphrase); 55 char *passphrase); 62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase); 64 char *passphrase); 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { 82 return openssh_read(filename, passphrase); 87 return sshcom_read(filename, passphrase); 93 int import_write(const char *filename, sign_key *key, char *passphrase, 97 return openssh_write(filename, key, passphrase); 102 return sshcom_write(filename, key, passphrase); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
config_ssid.h | 136 * passphrase - WPA ASCII passphrase 138 * If this is set, psk will be generated using the SSID and passphrase 139 * configured for the network. ASCII passphrase must be between 8 and 142 char *passphrase; member in struct:wpa_ssid 145 * ext_psk - PSK/passphrase name in external storage 147 * If this is set, PSK/passphrase will be fetched from external storage 310 * be set (either directly or using ASCII passphrase).
|
p2p_supplicant.c | 503 if (ssid->passphrase && !s->passphrase) 505 else if (ssid->passphrase && s->passphrase && 506 os_strcmp(ssid->passphrase, s->passphrase) != 0) 539 if (ssid->passphrase) { 540 os_free(s->passphrase); 541 s->passphrase = os_strdup(ssid->passphrase); [all...] |
config.c | 288 os_free(ssid->passphrase); 289 ssid->passphrase = NULL; 313 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 320 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 321 os_memcmp(ssid->passphrase, value, len) == 0) 324 os_free(ssid->passphrase); 325 ssid->passphrase = os_malloc(len + 1); 326 if (ssid->passphrase == NULL [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/openssh/contrib/ |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
/system/netd/ |
SoftapController.h | 41 void generatePsk(char *ssid, char *passphrase, char *psk);
|
SoftapController.cpp | 119 ALOGE("Softap set is missing arguments. Please use: softap <wlan iface> <SSID> <wpa2?-psk|open> <passphrase>"); 214 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) { 218 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
|
/external/openssh/contrib/cygwin/ |
ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/external/openssh/ |
authfile.c | 7 * for reading the passphrase from the user. 80 * passphrase. The identification of the blob (lowest 64 bits of n) will 82 * passphrase. 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, 96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 99 cipher_num = (strcmp(passphrase, "") == 0) ? 107 /* Put checkbytes for checking passphrase validity. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 184 error("passphrase too short: have %d bytes, need > 4", len) [all...] |
sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; local 251 * load the private key. Try first with empty passphrase; if it 252 * fails, ask for a passphrase. 261 "Enter passphrase for RSA key '%.100s': ", comment); 263 passphrase = read_passphrase(buf, 0); 264 if (strcmp(passphrase, "") != 0) { 266 authfile, passphrase, NULL, NULL); 269 debug2("no passphrase given, try next key"); 272 memset(passphrase, 0, strlen(passphrase)); [all...] |
ssh-keygen.c | 61 * Flag indicating that we just want to change the passphrase. This can be 94 /* This is set to the passphrase if given on the command line. */ 97 /* This is set to the new passphrase if given on the command line. */ 247 pass = read_passphrase("Enter passphrase: ", 1174 * Perform changing a passphrase. The argument is the passwd structure 1191 /* Try to load the file with empty passphrase. */ 1198 read_passphrase("Enter old passphrase: ", 1205 printf("Bad passphrase.\n"); 1211 /* Ask the new passphrase (twice). */ 1217 read_passphrase("Enter new passphrase (empty for no 1293 char new_comment[1024], *comment, *passphrase; local [all...] |
cipher.c | 296 * passphrase and using the resulting 16 bytes as the key. 301 const char *passphrase, int do_encrypt) 307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
|
/external/chromium/chrome/browser/ui/webui/options/ |
sync_setup_handler.cc | 127 !result->GetString("passphrase", &config->secondary_passphrase)) 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { 139 return result->GetString("passphrase", passphrase); 144 std::string* passphrase) { 151 result->GetString("passphrase", passphrase); 288 web_ui_->RegisterMessageCallback("Passphrase", 321 StringValue page("passphrase"); 422 std::string passphrase; 448 std::string passphrase; local [all...] |
/external/bison/build-aux/ |
gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv [all...] |
/external/chromium/chrome/browser/resources/options/ |
sync_setup_overlay.css | 19 #sync-passphrase-container { 23 #sync-custom-passphrase { 27 #sync-passphrase-message { 31 .sync-custom-passphrase-input { 115 #passphrase-encryption-message { 120 #passphrase-input { 153 #sync-passphrase-warning {
|
/external/chromium/chrome/browser/sync/ |
sync_setup_flow.h | 63 // Fills |args| for the enter passphrase screen. 85 // The 'passphrase' screen is used when the user is prompted to enter 86 // an existing passphrase. 87 void OnPassphraseEntry(const std::string& passphrase); 89 // The user canceled the passphrase entry without supplying a passphrase. 92 // The 'first passphrase' screen is for users migrating from a build 93 // without passwords, who are prompted to make a passphrase choice. 96 const std::string& passphrase); 145 // Set to true if we've tried creating/setting an explicit passphrase, so w [all...] |
sync_setup_flow.cc | 159 args->SetString("iframeToShow", "passphrase"); 238 // If we are activating the passphrase, we need to have one supplied. 253 void SyncSetupFlow::OnPassphraseEntry(const std::string& passphrase) { 255 service_->SetPassphrase(passphrase, true, false); 260 // If the user cancels when being asked for the passphrase, 270 const std::string& passphrase) {
|
/external/chromium/chrome/browser/chromeos/status/ |
network_menu.h | 43 // Remembered passphrase. 44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo 45 // true if the network requires a passphrase. 60 const std::string& passphrase,
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 424 char *passphrase, *strpassphrase; local 432 passphrase = radius_msg_get_tunnel_password( 436 * Passphrase is NULL iff there is no i-th Tunnel-Password 439 if (passphrase == NULL) 442 * passphrase does not contain the NULL termination. 448 os_memcpy(strpassphrase, passphrase, passphraselen); 459 os_free(passphrase);
|