/external/wpa_supplicant_8/hostapd/ |
hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/system/core/fastboot/ |
p12topem.sh | 5 echo "Usage: $0 alias passphrase"
|
/external/openssh/contrib/ |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
README | 20 passphrase requester. This is highly recommended: 35 A GNOME and Gtk2 passphrase requesters. Use "make gnome-ssh-askpass1" or
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.h | 43 // @param passphrase the private key passphrase 47 std::string passphrase); 51 // @param passphrase the private key passphrase to use 54 std::string passphrase);
|
certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]);
|
/external/owasp/sanitizer/tools/ |
stage_to_maven_central.sh | 24 PASSPHRASE="$2" 29 echo "Usage: $0 <version> <passphrase>" 36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME." 54 if [ -z "$PASSPHRASE" ]; then 55 echo "Missing passphrase" 81 -Dgpg.passphrase="$PASSPHRASE" \
|
/external/openssh/ |
ssh-add.0 | 20 If any file requires a passphrase, ssh-add asks for the passphrase from 21 the user. The passphrase is read from the user's tty. ssh-add retries 22 the last passphrase if multiple identity files are given. 77 If ssh-add needs a passphrase, it will read the passphrase from 81 SSH_ASKPASS and open an X11 window to read the passphrase. This
|
key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, 360 key_load_private(const char *path, const char *passphrase, 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { 380 key_load_private_cert(int type, const char *filename, const char *passphrase, 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, 401 key_load_private_type(int type, const char *filename, const char *passphrase, 407 if ((r = sshkey_load_private_type(type, filename, passphrase,
|
ssh-add.1 | 73 If any file requires a passphrase, 75 asks for the passphrase from the user. 76 The passphrase is read from the user's tty. 78 retries the last passphrase if multiple identity files are given. 149 needs a passphrase, it will read the passphrase from the current 159 and open an X11 window to read the passphrase.
|
ssh-keygen.0 | 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile] 55 name but M-bM-^@M-^\.pubM-bM-^@M-^] appended. The program also asks for a passphrase. The 56 passphrase may be empty to indicate no passphrase (host keys must have an 57 empty passphrase), or it may be a string of arbitrary length. A 58 passphrase is similar to a password, except it can be a phrase with a 64 alphanumeric characters. The passphrase can be changed later by using 67 There is no way to recover a lost passphrase. If the passphrase is lost 84 default key file path, an empty passphrase, default bits for th [all...] |
ssh-keygen.1 | 71 .Op Fl P Ar passphrase 186 The program also asks for a passphrase. 187 The passphrase may be empty to indicate no passphrase 188 (host keys must have an empty passphrase), or it may be a string of 190 A passphrase is similar to a password, except it can be a phrase with a 198 The passphrase can be changed later by using the 202 There is no way to recover a lost passphrase. 203 If the passphrase is lost or forgotten, a new key must be generated 225 an empty passphrase, default bits for the key type, and default comment [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
userdatarequest.cpp | 68 else if (strcmp(tmp, "PASSPHRASE") == 0) { 69 queryField->setText(tr("Private key passphrase: "));
|
/external/bison/build-aux/ |
gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 232 public void setPassphrase(String passphrase) { 233 mPassphrase = passphrase; 237 * Get the passphrase of the group. This function will return a valid passphrase only 238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/4/ |
forge-parent-4.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/5/ |
forge-parent-5.pom | 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
|
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/6/ |
forge-parent-6.pom | 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile --> 186 <passphrase>${gpg.passphrase}</passphrase>
|