HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 1 - 25 of 322) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/hostapd/
hostapd.radius_clients 2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
hostapd.wpa_psk 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_passphrase.sgml 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 11 psk="secret passphrase"
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
  /system/core/fastboot/
p12topem.sh 5 echo "Usage: $0 alias passphrase"
  /external/openssh/contrib/
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
README 20 passphrase requester. This is highly recommended:
35 A GNOME and Gtk2 passphrase requesters. Use "make gnome-ssh-askpass1" or
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.h 43 // @param passphrase the private key passphrase
47 std::string passphrase);
51 // @param passphrase the private key passphrase to use
54 std::string passphrase);
certificateutil.cc 55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
  /external/owasp/sanitizer/tools/
stage_to_maven_central.sh 24 PASSPHRASE="$2"
29 echo "Usage: $0 <version> <passphrase>"
36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME."
54 if [ -z "$PASSPHRASE" ]; then
55 echo "Missing passphrase"
81 -Dgpg.passphrase="$PASSPHRASE" \
  /external/openssh/
ssh-add.0 20 If any file requires a passphrase, ssh-add asks for the passphrase from
21 the user. The passphrase is read from the user's tty. ssh-add retries
22 the last passphrase if multiple identity files are given.
77 If ssh-add needs a passphrase, it will read the passphrase from
81 SSH_ASKPASS and open an X11 window to read the passphrase. This
key.c 294 key_save_private(Key *key, const char *filename, const char *passphrase,
300 if ((r = sshkey_save_private(key, filename, passphrase, comment,
360 key_load_private(const char *path, const char *passphrase,
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) {
380 key_load_private_cert(int type, const char *filename, const char *passphrase,
386 if ((r = sshkey_load_private_cert(type, filename, passphrase,
401 key_load_private_type(int type, const char *filename, const char *passphrase,
407 if ((r = sshkey_load_private_type(type, filename, passphrase,
ssh-add.1 73 If any file requires a passphrase,
75 asks for the passphrase from the user.
76 The passphrase is read from the user's tty.
78 retries the last passphrase if multiple identity files are given.
149 needs a passphrase, it will read the passphrase from the current
159 and open an X11 window to read the passphrase.
ssh-keygen.0 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
55 name but M-bM-^@M-^\.pubM-bM-^@M-^] appended. The program also asks for a passphrase. The
56 passphrase may be empty to indicate no passphrase (host keys must have an
57 empty passphrase), or it may be a string of arbitrary length. A
58 passphrase is similar to a password, except it can be a phrase with a
64 alphanumeric characters. The passphrase can be changed later by using
67 There is no way to recover a lost passphrase. If the passphrase is lost
84 default key file path, an empty passphrase, default bits for th
    [all...]
ssh-keygen.1 71 .Op Fl P Ar passphrase
186 The program also asks for a passphrase.
187 The passphrase may be empty to indicate no passphrase
188 (host keys must have an empty passphrase), or it may be a string of
190 A passphrase is similar to a password, except it can be a phrase with a
198 The passphrase can be changed later by using the
202 There is no way to recover a lost passphrase.
203 If the passphrase is lost or forgotten, a new key must be generated
225 an empty passphrase, default bits for the key type, and default comment
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
userdatarequest.cpp 68 else if (strcmp(tmp, "PASSPHRASE") == 0) {
69 queryField->setText(tr("Private key passphrase: "));
  /external/bison/build-aux/
gnupload 224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
232 public void setPassphrase(String passphrase) {
233 mPassphrase = passphrase;
237 * Get the passphrase of the group. This function will return a valid passphrase only
238 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/4/
forge-parent-4.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/5/
forge-parent-5.pom 159 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
160 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/sonatype/forge/forge-parent/6/
forge-parent-6.pom 185 <!-- this presumes the correct gpg.passphrase property in the settings "release" proile -->
186 <passphrase>${gpg.passphrase}</passphrase>

Completed in 467 milliseconds

1 2 3 4 5 6 7 8 91011>>