/external/wpa_supplicant_8/hostapd/ |
hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 63) [all...] |
/system/connectivity/shill/test-scripts/ |
configure-hidden-wifi | 7 print "Usage: %s <ssid> [passphrase] [security]" % (sys.argv[0]) 20 passphrase = sys.argv[2] 23 passphrase = "" 31 "Passphrase" : passphrase }))
|
test-flimflam | 18 print " passphrase <service> [passphrase]" 85 if "WiFi.Passphrase" in properties.keys(): 86 if properties["WiFi.Passphrase"] != "": 87 details += "{passphrase present}" 163 elif sys.argv[1] in ["passphrase", "pass"]: 174 passphrase = sys.argv[3] 176 service.SetProperty("Passphrase", passphrase) 178 print "Passphrase %s set for %s" % (passphrase, sys.argv[2] [all...] |
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/external/curl/tests/unit/ |
unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 100 if(passphrase) { 101 if(strcmp(p[2], passphrase)) { 102 printf("expected passphrase '%s' but got '%s'" 103 "for -E param '%s'\n", p[2], passphrase, p[0]); 107 printf("expected passphrase '%s' but got NULL " 112 if(passphrase) { 113 printf("expected passphrase NULL but got '%s' 119 if(passphrase) free(passphrase); variable [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.h | 43 // @param passphrase the private key passphrase 47 std::string passphrase); 51 // @param passphrase the private key passphrase to use 54 std::string passphrase);
|
certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]);
|
/external/autotest/server/cros/ap_configurators/ |
trendnet691gr_ap_configurator.py | 30 wait_for_xpath='id("passphrase")') 31 self.set_content_of_text_field_by_id(shared_key, 'passphrase')
|
/external/owasp/sanitizer/tools/ |
stage_to_maven_central.sh | 24 PASSPHRASE="$2" 29 echo "Usage: $0 <version> <passphrase>" 36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME." 54 if [ -z "$PASSPHRASE" ]; then 55 echo "Missing passphrase" 81 -Dgpg.passphrase="$PASSPHRASE" \
|
/external/autotest/client/cros/scripts/ |
wifi | 38 print cmd, 'connect <ssid> [passphrase] [security]' 39 print ' |security| defaults to "psk" when |passphrase|', 49 print cmd, 'configure <ssid> [passphrase] [security]' 50 print ' |security| defaults to "psk" when |passphrase|', 55 def configure(ssid, security, passphrase): 58 if passphrase is not None: 59 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 78 like the passphrase for psk security. 129 like the passphrase for psk security. 186 passphrase = Non [all...] |
/external/autotest/client/common_lib/cros/network/ |
apmanager_constants.py | 14 CONFIG_PASSPHRASE = 'Passphrase'
|
/system/connectivity/shill/wifi/ |
wifi_service.cc | 70 const char WiFiService::kStoragePassphrase[] = "Passphrase"; 262 bool WiFiService::SetPassphrase(const string& passphrase, Error* error) { 264 ValidateWEPPassphrase(passphrase, error); 268 ValidateWPAPassphrase(passphrase, error); 274 LOG(ERROR) << "Passphrase could not be set: " << error->message(); 278 return SetPassphraseInternal(passphrase, Service::kReasonPropertyUpdate); 282 const string& passphrase, 284 if (passphrase_ == passphrase) { 291 passphrase_ = passphrase; 381 string passphrase; local [all...] |
wifi_service.h | 162 // of a connection with particular EAP credentials or a passphrase. 268 static void ValidateWEPPassphrase(const std::string& passphrase, 270 static void ValidateWPAPassphrase(const std::string& passphrase, 272 static void ParseWEPPassphrase(const std::string& passphrase, 276 static bool CheckWEPIsHex(const std::string& passphrase, Error* error); 277 static bool CheckWEPKeyIndex(const std::string& passphrase, Error* error); 278 static bool CheckWEPPrefix(const std::string& passphrase, Error* error); 306 // Called from DBus and during Load to validate and apply a passphrase for 307 // this service. If the passphrase is successfully changed, UpdateConnectable 309 // method will return false if the passphrase cannot be set. If th [all...] |
/external/libweave/examples/provider/ |
wifi_manager.h | 34 const std::string& passphrase, 45 const std::string& passphrase,
|
wifi_manager.cc | 80 const std::string& passphrase, 108 {"dev", "wifi", "connect", ssid, "password", passphrase}); 123 passphrase, pid, until, callback), 128 const std::string& passphrase, 140 TryToConnect(ssid, passphrase, 0,
|
/external/testng/ |
README.dev | 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy 36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
|
/external/libweave/include/weave/provider/ |
wifi.h | 22 const std::string& passphrase,
|
/system/connectivity/apmanager/dbus_bindings/ |
org.chromium.apmanager.Config.dbus-xml | 8 <property name="Passphrase" type="s" access="write"/>
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
userdatarequest.cpp | 68 else if (strcmp(tmp, "PASSPHRASE") == 0) { 69 queryField->setText(tr("Private key passphrase: "));
|
/external/bison/build-aux/ |
gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv [all...] |