HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 1 - 25 of 58) sorted by null

1 2 3

  /external/dropbear/
keyimport.h 37 int import_write(const char *filename, sign_key *key, char *passphrase,
39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
keyimport.c 53 static sign_key *openssh_read(const char *filename, char *passphrase);
55 char *passphrase);
62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase);
64 char *passphrase);
79 sign_key *import_read(const char *filename, char *passphrase, int filetype) {
82 return openssh_read(filename, passphrase);
87 return sshcom_read(filename, passphrase);
93 int import_write(const char *filename, sign_key *key, char *passphrase,
97 return openssh_write(filename, key, passphrase);
102 return sshcom_write(filename, key, passphrase);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
config_ssid.h 136 * passphrase - WPA ASCII passphrase
138 * If this is set, psk will be generated using the SSID and passphrase
139 * configured for the network. ASCII passphrase must be between 8 and
142 char *passphrase; member in struct:wpa_ssid
145 * ext_psk - PSK/passphrase name in external storage
147 * If this is set, PSK/passphrase will be fetched from external storage
310 * be set (either directly or using ASCII passphrase).
p2p_supplicant.c 503 if (ssid->passphrase && !s->passphrase)
505 else if (ssid->passphrase && s->passphrase &&
506 os_strcmp(ssid->passphrase, s->passphrase) != 0)
539 if (ssid->passphrase) {
540 os_free(s->passphrase);
541 s->passphrase = os_strdup(ssid->passphrase);
    [all...]
config.c 288 os_free(ssid->passphrase);
289 ssid->passphrase = NULL;
313 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
320 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
321 os_memcmp(ssid->passphrase, value, len) == 0)
324 os_free(ssid->passphrase);
325 ssid->passphrase = os_malloc(len + 1);
326 if (ssid->passphrase == NULL
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
  /external/openssh/contrib/
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
  /system/netd/
SoftapController.h 41 void generatePsk(char *ssid, char *passphrase, char *psk);
SoftapController.cpp 119 ALOGE("Softap set is missing arguments. Please use: softap <wlan iface> <SSID> <wpa2?-psk|open> <passphrase>");
214 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) {
218 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
  /external/openssh/contrib/cygwin/
ssh-user-config 37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
  /external/openssh/
authfile.c 7 * for reading the passphrase from the user.
80 * passphrase. The identification of the blob (lowest 64 bits of n) will
82 * passphrase.
85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase,
96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
99 cipher_num = (strcmp(passphrase, "") == 0) ?
107 /* Put checkbytes for checking passphrase validity. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
184 error("passphrase too short: have %d bytes, need > 4", len)
    [all...]
sshconnect1.c 210 char buf[300], *passphrase, *comment, *authfile; local
251 * load the private key. Try first with empty passphrase; if it
252 * fails, ask for a passphrase.
261 "Enter passphrase for RSA key '%.100s': ", comment);
263 passphrase = read_passphrase(buf, 0);
264 if (strcmp(passphrase, "") != 0) {
266 authfile, passphrase, NULL, NULL);
269 debug2("no passphrase given, try next key");
272 memset(passphrase, 0, strlen(passphrase));
    [all...]
ssh-keygen.c 61 * Flag indicating that we just want to change the passphrase. This can be
94 /* This is set to the passphrase if given on the command line. */
97 /* This is set to the new passphrase if given on the command line. */
247 pass = read_passphrase("Enter passphrase: ",
1174 * Perform changing a passphrase. The argument is the passwd structure
1191 /* Try to load the file with empty passphrase. */
1198 read_passphrase("Enter old passphrase: ",
1205 printf("Bad passphrase.\n");
1211 /* Ask the new passphrase (twice). */
1217 read_passphrase("Enter new passphrase (empty for no
1293 char new_comment[1024], *comment, *passphrase; local
    [all...]
cipher.c 296 * passphrase and using the resulting 16 bytes as the key.
301 const char *passphrase, int do_encrypt)
307 MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
  /external/chromium/chrome/browser/ui/webui/options/
sync_setup_handler.cc 127 !result->GetString("passphrase", &config->secondary_passphrase))
133 bool GetPassphrase(const std::string& json, std::string* passphrase) {
139 return result->GetString("passphrase", passphrase);
144 std::string* passphrase) {
151 result->GetString("passphrase", passphrase);
288 web_ui_->RegisterMessageCallback("Passphrase",
321 StringValue page("passphrase");
422 std::string passphrase;
448 std::string passphrase; local
    [all...]
  /external/bison/build-aux/
gnupload 224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv
    [all...]
  /external/chromium/chrome/browser/resources/options/
sync_setup_overlay.css 19 #sync-passphrase-container {
23 #sync-custom-passphrase {
27 #sync-passphrase-message {
31 .sync-custom-passphrase-input {
115 #passphrase-encryption-message {
120 #passphrase-input {
153 #sync-passphrase-warning {
  /external/chromium/chrome/browser/sync/
sync_setup_flow.h 63 // Fills |args| for the enter passphrase screen.
85 // The 'passphrase' screen is used when the user is prompted to enter
86 // an existing passphrase.
87 void OnPassphraseEntry(const std::string& passphrase);
89 // The user canceled the passphrase entry without supplying a passphrase.
92 // The 'first passphrase' screen is for users migrating from a build
93 // without passwords, who are prompted to make a passphrase choice.
96 const std::string& passphrase);
145 // Set to true if we've tried creating/setting an explicit passphrase, so w
    [all...]
sync_setup_flow.cc 159 args->SetString("iframeToShow", "passphrase");
238 // If we are activating the passphrase, we need to have one supplied.
253 void SyncSetupFlow::OnPassphraseEntry(const std::string& passphrase) {
255 service_->SetPassphrase(passphrase, true, false);
260 // If the user cancels when being asked for the passphrase,
270 const std::string& passphrase) {
  /external/chromium/chrome/browser/chromeos/status/
network_menu.h 43 // Remembered passphrase.
44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo
45 // true if the network requires a passphrase.
60 const std::string& passphrase,
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 424 char *passphrase, *strpassphrase; local
432 passphrase = radius_msg_get_tunnel_password(
436 * Passphrase is NULL iff there is no i-th Tunnel-Password
439 if (passphrase == NULL)
442 * passphrase does not contain the NULL termination.
448 os_memcpy(strpassphrase, passphrase, passphraselen);
459 os_free(passphrase);

Completed in 843 milliseconds

1 2 3