/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
config_ssid.h | 144 * passphrase - WPA ASCII passphrase 146 * If this is set, psk will be generated using the SSID and passphrase 147 * configured for the network. ASCII passphrase must be between 8 and 150 char *passphrase; member in struct:wpa_ssid 153 * ext_psk - PSK/passphrase name in external storage 155 * If this is set, PSK/passphrase will be fetched from external storage 318 * be set (either directly or using ASCII passphrase).
|
/external/openssh/contrib/ |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
/external/openssh/ |
sshconnect1.c | 210 char buf[300], *passphrase, *comment, *authfile; local 251 * load the private key. Try first with empty passphrase; if it 252 * fails, ask for a passphrase. 261 "Enter passphrase for RSA key '%.100s': ", comment); 263 passphrase = read_passphrase(buf, 0); 264 if (strcmp(passphrase, "") != 0) { 266 authfile, passphrase, NULL, NULL); 269 debug2("no passphrase given, try next key"); 272 memset(passphrase, 0, strlen(passphrase)); [all...] |
authfile.c | 7 * for reading the passphrase from the user. 80 * passphrase. The identification of the blob (lowest 64 bits of n) will 82 * passphrase. 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, 96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 99 cipher_num = (strcmp(passphrase, "") == 0) ? 107 /* Put checkbytes for checking passphrase validity. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 184 error("passphrase too short: have %d bytes, need > 4", len) [all...] |
ssh-keygen.c | 61 * Flag indicating that we just want to change the passphrase. This can be 94 /* This is set to the passphrase if given on the command line. */ 97 /* This is set to the new passphrase if given on the command line. */ 247 pass = read_passphrase("Enter passphrase: ", 1174 * Perform changing a passphrase. The argument is the passwd structure 1191 /* Try to load the file with empty passphrase. */ 1198 read_passphrase("Enter old passphrase: ", 1205 printf("Bad passphrase.\n"); 1211 /* Ask the new passphrase (twice). */ 1217 read_passphrase("Enter new passphrase (empty for no 1293 char new_comment[1024], *comment, *passphrase; local [all...] |
sshconnect2.c | 1317 char prompt[300], *passphrase; local [all...] |
/external/chromium/chrome/browser/ui/webui/options/ |
sync_setup_handler.cc | 127 !result->GetString("passphrase", &config->secondary_passphrase)) 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { 139 return result->GetString("passphrase", passphrase); 144 std::string* passphrase) { 151 result->GetString("passphrase", passphrase); 288 web_ui_->RegisterMessageCallback("Passphrase", 321 StringValue page("passphrase"); 422 std::string passphrase; 448 std::string passphrase; local [all...] |
/external/chromium_org/chromeos/dbus/ |
shill_service_client_stub.cc | 210 std::string passphrase; local 212 flimflam::kPassphraseProperty, &passphrase); 213 if (passphrase == "failure") 227 if (passphrase == "failure") {
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 424 char *passphrase, *strpassphrase; local 432 passphrase = radius_msg_get_tunnel_password( 436 * Passphrase is NULL iff there is no i-th Tunnel-Password 439 if (passphrase == NULL) 442 * passphrase does not contain the NULL termination. 448 os_memcpy(strpassphrase, passphrase, passphraselen); 459 os_free(passphrase);
|
/external/chromium/chrome/browser/chromeos/status/ |
network_menu.h | 43 // Remembered passphrase. 44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo 45 // true if the network requires a passphrase. 60 const std::string& passphrase,
|
/external/chromium_org/chrome/browser/chromeos/cros/ |
network_library_impl_base.h | 186 const std::string& passphrase, 241 std::string passphrase; member in struct:chromeos::NetworkLibraryImplBase::ConnectData
|
network_library_impl_stub.cc | 446 std::string passphrase; local 450 passphrase = wifi->passphrase(); 454 passphrase = wimax->eap_passphrase(); 456 if (!passphrase.empty()) { 457 if (passphrase.find("bad") == 0) { 460 } else if (passphrase.find("error") == 0) {
|
native_network_parser.cc | 1091 std::string passphrase; local 1165 std::string passphrase; local [all...] |
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 70 std::string passphrase; member in struct:__anon9010::SyncConfigInfo 155 // Passphrase settings. 168 if (!result->GetString("passphrase", &config->passphrase)) { 169 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value"; 332 // usePassphrase: true if the data is encrypted with a secondary passphrase 333 // show_passphrase: true if a passphrase is needed to decrypt the sync data 358 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase 650 // if (for example) some kind of passphrase error is encountered. 655 if (!configuration.passphrase.empty()) [all...] |
/external/chromium_org/chromeos/network/ |
network_configuration_handler_unittest.cc | 515 std::string identity, passphrase; local 519 service_path, flimflam::kPassphraseProperty, &passphrase)); 521 EXPECT_EQ(test_passphrase, passphrase); 541 service_path, flimflam::kIdentityProperty, &passphrase));
|
network_connection_handler.cc | 86 NET_LOG_EVENT("OpenVPN: Passphrase Required", service_path); 92 std::string passphrase; local 96 NET_LOG_EVENT("VPN: Passphrase Required", service_path); 111 "passphrase-required"; 350 // If 'passphrase_required' is still true, then the 'Passphrase' property
|
/external/chromium/chrome/browser/chromeos/options/ |
wifi_config_view.cc | 303 // If security is not none, also enforce passphrase is non empty. 313 // if the network requires a passphrase, make sure it is the right length. 559 // Passphrase 567 const std::string passphrase = GetPassphrase(); local 568 if (passphrase != wifi->passphrase()) 569 wifi->SetPassphrase(passphrase); 726 // Passphrase input 737 // Disable passphrase input initially for other network. 880 // Passphrase [all...] |
/external/chromium/chrome/browser/ui/webui/options/chromeos/ |
internet_options_handler.cc | 787 std::string passphrase; local [all...] |
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption.cc | 101 base::StringPiece passphrase, 105 const std::string combined = salt.as_string() + passphrase.as_string(); 191 base::StringPiece passphrase, 204 ParseSymmetricKeyEncrypted(&inner, passphrase, &decryption_context); 371 // ParseSymmetricKeyEncrypted parses a passphrase protected session key. See 375 base::StringPiece passphrase, 413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt, 414 passphrase.size() + salt.size(), key); 422 cipher_key_length, hash_function, passphrase, salt, 621 base::StringPiece passphrase) { 693 sizeof(key), HASH_AlgSHA1, passphrase, local [all...] |
/external/chromium_org/chrome/browser/chromeos/options/ |
wifi_config_view.cc | 401 // If the network requires a passphrase, make sure it is the right length. 488 // Passphrase. 660 std::string passphrase = GetPassphrase(); local 661 if (!passphrase.empty()) { 693 const std::string passphrase = GetPassphrase(); local 694 if (!passphrase.empty()) { 696 flimflam::kPassphraseProperty, passphrase); 1145 std::string passphrase; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 101 * passphrase - WPA2-Personal passphrase for the group (GO only) 103 char passphrase[64]; member in struct:p2p_go_neg_results [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-jsch.jar | |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.h | 671 const std::string& passphrase() const { return passphrase_; } function in class:chromeos::WifiNetwork 693 void SetPassphrase(const std::string& passphrase); 705 void SetEAPPassphrase(const std::string& passphrase); 715 // Return true if a passphrase or other input is required to connect. 731 void set_passphrase(const std::string& passphrase) { 732 passphrase_ = passphrase; 758 // Tells flimflam to save passphrase and EAP credentials to disk. 762 // Passphrase set by user (stored for UI). [all...] |