HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 1 - 25 of 57) sorted by null

1 2 3

  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
config_ssid.h 164 * passphrase - WPA ASCII passphrase
166 * If this is set, psk will be generated using the SSID and passphrase
167 * configured for the network. ASCII passphrase must be between 8 and
170 char *passphrase; member in struct:wpa_ssid
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase to the configuration fil
    [all...]
p2p_supplicant.c 1042 if (ssid->passphrase && !s->passphrase)
1044 else if (ssid->passphrase && s->passphrase &&
1045 os_strcmp(ssid->passphrase, s->passphrase) != 0)
1078 if (ssid->passphrase) {
1079 os_free(s->passphrase);
1080 s->passphrase = os_strdup(ssid->passphrase);
    [all...]
wps_supplicant.c 312 if (new_ssid->passphrase && ssid->passphrase &&
313 os_strcmp(new_ssid->passphrase, ssid->passphrase) !=
316 "WPS: M8 Creds with different passphrase - do not merge");
328 if ((new_ssid->passphrase && !ssid->passphrase) ||
329 (!new_ssid->passphrase && ssid->passphrase)) {
331 "WPS: M8 Creds with different passphrase/PSK type - do not merge")
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.h 43 // @param passphrase the private key passphrase
47 std::string passphrase);
51 // @param passphrase the private key passphrase to use
54 std::string passphrase);
certificateutil.cc 55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
  /external/openssh/contrib/
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
  /external/openssh/
authfile.h 46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
key.c 294 key_save_private(Key *key, const char *filename, const char *passphrase,
300 if ((r = sshkey_save_private(key, filename, passphrase, comment,
360 key_load_private(const char *path, const char *passphrase,
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) {
380 key_load_private_cert(int type, const char *filename, const char *passphrase,
386 if ((r = sshkey_load_private_cert(type, filename, passphrase,
401 key_load_private_type(int type, const char *filename, const char *passphrase,
407 if ((r = sshkey_load_private_type(type, filename, passphrase,
authfile.c 77 const char *passphrase, const char *comment,
85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment,
198 sshkey_load_private_type(int type, const char *filename, const char *passphrase,
221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp);
228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
240 passphrase, keyp, commentp)) != 0)
253 sshkey_load_private(const char *filename, const char *passphrase,
275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename,
436 sshkey_load_private_cert(int type, const char *filename, const char *passphrase,
458 passphrase, &key, NULL, perm_ok)) != 0 |
    [all...]
sshkey.h 186 const char *passphrase, const char *comment,
191 const char *passphrase, const char *filename, struct sshkey **keyp,
194 const char *passphrase, struct sshkey **keyp, char **commentp);
sshconnect1.c 224 char buf[300], *passphrase, *comment, *authfile; local
265 * load the private key. Try first with empty passphrase; if it
266 * fails, ask for a passphrase.
275 "Enter passphrase for RSA key '%.100s': ", comment);
277 passphrase = read_passphrase(buf, 0);
278 if (strcmp(passphrase, "") != 0) {
280 authfile, passphrase, NULL, NULL);
283 debug2("no passphrase given, try next key");
286 explicit_bzero(passphrase, strlen(passphrase));
    [all...]
sshkey.c 3520 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
    [all...]
ssh-keygen.c 68 * Flag indicating that we just want to change the passphrase. This can be
104 /* This is set to the passphrase if given on the command line. */
107 /* This is set to the new passphrase if given on the command line. */
288 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN);
1240 * Perform changing a passphrase. The argument is the passwd structure
1258 /* Try to load the file with empty passphrase. */
1265 read_passphrase("Enter old passphrase: ",
1364 char new_comment[1024], *comment, *passphrase; local
    [all...]
sshconnect2.c 1131 char prompt[300], *passphrase; local
1141 "Enter passphrase for key '%.100s': ", filename);
1144 passphrase = "";
1146 passphrase = read_passphrase(prompt, 0);
1147 if (*passphrase == '\0') {
1148 debug2("no passphrase given, try next key");
1149 free(passphrase);
1154 passphrase, &private, NULL, &perm_ok))) {
1163 debug2("bad passphrase given, try again...");
1179 explicit_bzero(passphrase, strlen(passphrase))
    [all...]
  /system/netd/server/
SoftapController.h 42 void generatePsk(char *ssid, char *passphrase, char *psk);
SoftapController.cpp 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>");
213 void SoftapController::generatePsk(char *ssid, char *passphrase, char *psk_str) {
217 PKCS5_PBKDF2_HMAC_SHA1(passphrase, strlen(passphrase),
  /external/openssh/contrib/cygwin/
ssh-user-config 37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
  /external/bison/build-aux/
gnupload 224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv
    [all...]
  /external/owasp/sanitizer/tools/
stage_to_maven_central.sh 24 PASSPHRASE="$2"
29 echo "Usage: $0 <version> <passphrase>"
36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME."
54 if [ -z "$PASSPHRASE" ]; then
55 echo "Missing passphrase"
81 -Dgpg.passphrase="$PASSPHRASE" \
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 426 char *passphrase, *strpassphrase; local
434 passphrase = radius_msg_get_tunnel_password(
438 * Passphrase is NULL iff there is no i-th Tunnel-Password
441 if (passphrase == NULL)
444 * passphrase does not contain the NULL termination.
450 os_memcpy(strpassphrase, passphrase, passphraselen);
461 os_free(passphrase);

Completed in 3414 milliseconds

1 2 3