/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase to the configuration fil [all...] |
p2p_supplicant.c | 1042 if (ssid->passphrase && !s->passphrase) 1044 else if (ssid->passphrase && s->passphrase && 1045 os_strcmp(ssid->passphrase, s->passphrase) != 0) 1078 if (ssid->passphrase) { 1079 os_free(s->passphrase); 1080 s->passphrase = os_strdup(ssid->passphrase); [all...] |
wps_supplicant.c | 312 if (new_ssid->passphrase && ssid->passphrase && 313 os_strcmp(new_ssid->passphrase, ssid->passphrase) != 316 "WPS: M8 Creds with different passphrase - do not merge"); 328 if ((new_ssid->passphrase && !ssid->passphrase) || 329 (!new_ssid->passphrase && ssid->passphrase)) { 331 "WPS: M8 Creds with different passphrase/PSK type - do not merge") [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.h | 43 // @param passphrase the private key passphrase 47 std::string passphrase); 51 // @param passphrase the private key passphrase to use 54 std::string passphrase);
|
certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]);
|
/external/openssh/contrib/ |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
/external/openssh/ |
authfile.h | 46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
|
key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, 360 key_load_private(const char *path, const char *passphrase, 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { 380 key_load_private_cert(int type, const char *filename, const char *passphrase, 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, 401 key_load_private_type(int type, const char *filename, const char *passphrase, 407 if ((r = sshkey_load_private_type(type, filename, passphrase,
|
authfile.c | 77 const char *passphrase, const char *comment, 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, 198 sshkey_load_private_type(int type, const char *filename, const char *passphrase, 221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); 228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, 240 passphrase, keyp, commentp)) != 0) 253 sshkey_load_private(const char *filename, const char *passphrase, 275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename, 436 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, 458 passphrase, &key, NULL, perm_ok)) != 0 | [all...] |
sshkey.h | 186 const char *passphrase, const char *comment, 191 const char *passphrase, const char *filename, struct sshkey **keyp, 194 const char *passphrase, struct sshkey **keyp, char **commentp);
|
sshconnect1.c | 224 char buf[300], *passphrase, *comment, *authfile; local 265 * load the private key. Try first with empty passphrase; if it 266 * fails, ask for a passphrase. 275 "Enter passphrase for RSA key '%.100s': ", comment); 277 passphrase = read_passphrase(buf, 0); 278 if (strcmp(passphrase, "") != 0) { 280 authfile, passphrase, NULL, NULL); 283 debug2("no passphrase given, try next key"); 286 explicit_bzero(passphrase, strlen(passphrase)); [all...] |
sshkey.c | 3520 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local [all...] |
ssh-keygen.c | 68 * Flag indicating that we just want to change the passphrase. This can be 104 /* This is set to the passphrase if given on the command line. */ 107 /* This is set to the new passphrase if given on the command line. */ 288 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN); 1240 * Perform changing a passphrase. The argument is the passwd structure 1258 /* Try to load the file with empty passphrase. */ 1265 read_passphrase("Enter old passphrase: ", 1364 char new_comment[1024], *comment, *passphrase; local [all...] |
sshconnect2.c | 1131 char prompt[300], *passphrase; local 1141 "Enter passphrase for key '%.100s': ", filename); 1144 passphrase = ""; 1146 passphrase = read_passphrase(prompt, 0); 1147 if (*passphrase == '\0') { 1148 debug2("no passphrase given, try next key"); 1149 free(passphrase); 1154 passphrase, &private, NULL, &perm_ok))) { 1163 debug2("bad passphrase given, try again..."); 1179 explicit_bzero(passphrase, strlen(passphrase)) [all...] |
/system/netd/server/ |
SoftapController.h | 42 void generatePsk(char *ssid, char *passphrase, char *psk);
|
SoftapController.cpp | 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>"); 213 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) { 217 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
|
/external/openssh/contrib/cygwin/ |
ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/external/bison/build-aux/ |
gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv [all...] |
/external/owasp/sanitizer/tools/ |
stage_to_maven_central.sh | 24 PASSPHRASE="$2" 29 echo "Usage: $0 <version> <passphrase>" 36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME." 54 if [ -z "$PASSPHRASE" ]; then 55 echo "Missing passphrase" 81 -Dgpg.passphrase="$PASSPHRASE" \
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 426 char *passphrase, *strpassphrase; local 434 passphrase = radius_msg_get_tunnel_password( 438 * Passphrase is NULL iff there is no i-th Tunnel-Password 441 if (passphrase == NULL) 444 * passphrase does not contain the NULL termination. 450 os_memcpy(strpassphrase, passphrase, passphraselen); 461 os_free(passphrase);
|