HomeSort by relevance Sort by last modified time
    Searched defs:passphrase (Results 1 - 25 of 28) sorted by null

1 2

  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
config_ssid.h 144 * passphrase - WPA ASCII passphrase
146 * If this is set, psk will be generated using the SSID and passphrase
147 * configured for the network. ASCII passphrase must be between 8 and
150 char *passphrase; member in struct:wpa_ssid
153 * ext_psk - PSK/passphrase name in external storage
155 * If this is set, PSK/passphrase will be fetched from external storage
318 * be set (either directly or using ASCII passphrase).
  /external/openssh/contrib/
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
  /external/openssh/
sshconnect1.c 210 char buf[300], *passphrase, *comment, *authfile; local
251 * load the private key. Try first with empty passphrase; if it
252 * fails, ask for a passphrase.
261 "Enter passphrase for RSA key '%.100s': ", comment);
263 passphrase = read_passphrase(buf, 0);
264 if (strcmp(passphrase, "") != 0) {
266 authfile, passphrase, NULL, NULL);
269 debug2("no passphrase given, try next key");
272 memset(passphrase, 0, strlen(passphrase));
    [all...]
authfile.c 7 * for reading the passphrase from the user.
80 * passphrase. The identification of the blob (lowest 64 bits of n) will
82 * passphrase.
85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase,
96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting
99 cipher_num = (strcmp(passphrase, "") == 0) ?
107 /* Put checkbytes for checking passphrase validity. */
150 cipher_set_key_string(&ciphercontext, cipher, passphrase,
174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
184 error("passphrase too short: have %d bytes, need > 4", len)
    [all...]
ssh-keygen.c 61 * Flag indicating that we just want to change the passphrase. This can be
94 /* This is set to the passphrase if given on the command line. */
97 /* This is set to the new passphrase if given on the command line. */
247 pass = read_passphrase("Enter passphrase: ",
1174 * Perform changing a passphrase. The argument is the passwd structure
1191 /* Try to load the file with empty passphrase. */
1198 read_passphrase("Enter old passphrase: ",
1205 printf("Bad passphrase.\n");
1211 /* Ask the new passphrase (twice). */
1217 read_passphrase("Enter new passphrase (empty for no
1293 char new_comment[1024], *comment, *passphrase; local
    [all...]
sshconnect2.c 1317 char prompt[300], *passphrase; local
    [all...]
  /external/chromium/chrome/browser/ui/webui/options/
sync_setup_handler.cc 127 !result->GetString("passphrase", &config->secondary_passphrase))
133 bool GetPassphrase(const std::string& json, std::string* passphrase) {
139 return result->GetString("passphrase", passphrase);
144 std::string* passphrase) {
151 result->GetString("passphrase", passphrase);
288 web_ui_->RegisterMessageCallback("Passphrase",
321 StringValue page("passphrase");
422 std::string passphrase;
448 std::string passphrase; local
    [all...]
  /external/chromium_org/chromeos/dbus/
shill_service_client_stub.cc 210 std::string passphrase; local
212 flimflam::kPassphraseProperty, &passphrase);
213 if (passphrase == "failure")
227 if (passphrase == "failure") {
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 424 char *passphrase, *strpassphrase; local
432 passphrase = radius_msg_get_tunnel_password(
436 * Passphrase is NULL iff there is no i-th Tunnel-Password
439 if (passphrase == NULL)
442 * passphrase does not contain the NULL termination.
448 os_memcpy(strpassphrase, passphrase, passphraselen);
459 os_free(passphrase);
  /external/chromium/chrome/browser/chromeos/status/
network_menu.h 43 // Remembered passphrase.
44 std::string passphrase; member in struct:chromeos::NetworkMenuModel::NetworkInfo
45 // true if the network requires a passphrase.
60 const std::string& passphrase,
  /external/chromium_org/chrome/browser/chromeos/cros/
network_library_impl_base.h 186 const std::string& passphrase,
241 std::string passphrase; member in struct:chromeos::NetworkLibraryImplBase::ConnectData
network_library_impl_stub.cc 446 std::string passphrase; local
450 passphrase = wifi->passphrase();
454 passphrase = wimax->eap_passphrase();
456 if (!passphrase.empty()) {
457 if (passphrase.find("bad") == 0) {
460 } else if (passphrase.find("error") == 0) {
native_network_parser.cc 1091 std::string passphrase; local
1165 std::string passphrase; local
    [all...]
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.cc 70 std::string passphrase; member in struct:__anon9010::SyncConfigInfo
155 // Passphrase settings.
168 if (!result->GetString("passphrase", &config->passphrase)) {
169 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value";
332 // usePassphrase: true if the data is encrypted with a secondary passphrase
333 // show_passphrase: true if a passphrase is needed to decrypt the sync data
358 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase
650 // if (for example) some kind of passphrase error is encountered.
655 if (!configuration.passphrase.empty())
    [all...]
  /external/chromium_org/chromeos/network/
network_configuration_handler_unittest.cc 515 std::string identity, passphrase; local
519 service_path, flimflam::kPassphraseProperty, &passphrase));
521 EXPECT_EQ(test_passphrase, passphrase);
541 service_path, flimflam::kIdentityProperty, &passphrase));
network_connection_handler.cc 86 NET_LOG_EVENT("OpenVPN: Passphrase Required", service_path);
92 std::string passphrase; local
96 NET_LOG_EVENT("VPN: Passphrase Required", service_path);
111 "passphrase-required";
350 // If 'passphrase_required' is still true, then the 'Passphrase' property
  /external/chromium/chrome/browser/chromeos/options/
wifi_config_view.cc 303 // If security is not none, also enforce passphrase is non empty.
313 // if the network requires a passphrase, make sure it is the right length.
559 // Passphrase
567 const std::string passphrase = GetPassphrase(); local
568 if (passphrase != wifi->passphrase())
569 wifi->SetPassphrase(passphrase);
726 // Passphrase input
737 // Disable passphrase input initially for other network.
880 // Passphrase
    [all...]
  /external/chromium/chrome/browser/ui/webui/options/chromeos/
internet_options_handler.cc 787 std::string passphrase; local
    [all...]
  /external/chromium_org/crypto/
openpgp_symmetric_encryption.cc 101 base::StringPiece passphrase,
105 const std::string combined = salt.as_string() + passphrase.as_string();
191 base::StringPiece passphrase,
204 ParseSymmetricKeyEncrypted(&inner, passphrase, &decryption_context);
371 // ParseSymmetricKeyEncrypted parses a passphrase protected session key. See
375 base::StringPiece passphrase,
413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt,
414 passphrase.size() + salt.size(), key);
422 cipher_key_length, hash_function, passphrase, salt,
621 base::StringPiece passphrase) {
693 sizeof(key), HASH_AlgSHA1, passphrase, local
    [all...]
  /external/chromium_org/chrome/browser/chromeos/options/
wifi_config_view.cc 401 // If the network requires a passphrase, make sure it is the right length.
488 // Passphrase.
660 std::string passphrase = GetPassphrase(); local
661 if (!passphrase.empty()) {
693 const std::string passphrase = GetPassphrase(); local
694 if (!passphrase.empty()) {
696 flimflam::kPassphraseProperty, passphrase);
1145 std::string passphrase; local
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p.h 101 * passphrase - WPA2-Personal passphrase for the group (GO only)
103 char passphrase[64]; member in struct:p2p_go_neg_results
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
ant-jsch.jar 
  /external/chromium/chrome/browser/chromeos/cros/
network_library.h 671 const std::string& passphrase() const { return passphrase_; } function in class:chromeos::WifiNetwork
693 void SetPassphrase(const std::string& passphrase);
705 void SetEAPPassphrase(const std::string& passphrase);
715 // Return true if a passphrase or other input is required to connect.
731 void set_passphrase(const std::string& passphrase) {
732 passphrase_ = passphrase;
758 // Tells flimflam to save passphrase and EAP credentials to disk.
762 // Passphrase set by user (stored for UI).
    [all...]

Completed in 723 milliseconds

1 2