/external/curl/tests/unit/ |
unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 102 if(passphrase) { 103 if(strcmp(p[2], passphrase)) { 104 printf("expected passphrase '%s' but got '%s'" 105 "for -E param '%s'\n", p[2], passphrase, p[0]); 110 printf("expected passphrase '%s' but got NULL " 116 if(passphrase) { 117 printf("expected passphrase NULL but got '%s' 123 if(passphrase) free(passphrase); variable [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 23 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 24 "\nIf passphrase is left out, it will be read from " 32 passphrase = argv[2]; 34 printf("# reading passphrase from stdin\n"); 36 printf("Failed to read passphrase\n"); 48 passphrase = buf; 51 len = os_strlen(passphrase); 53 printf("Passphrase must be 8..63 characters\n") [all...] |
config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase to the configuration fil [all...] |
/external/syslinux/gpxe/src/net/80211/ |
wpa_psk.c | 50 char passphrase[64+1]; local 56 &net80211_key_setting, passphrase, 60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx ); 65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ), 68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx, 69 passphrase );
|
/external/openssh/contrib/ |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
/frameworks/base/wifi/java/android/net/wifi/aware/ |
WifiAwareNetworkSpecifier.java | 30 * {@link DiscoverySession#createNetworkSpecifierOpen(PeerHandle)} or their secure (Passphrase) 37 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional 43 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional 50 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional 56 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional 105 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should 112 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or 113 * passphrase should be specified. 116 public final String passphrase; field in class:WifiAwareNetworkSpecifier 120 byte[] peerMac, byte[] pmk, String passphrase) { [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareNativeApi.java | 590 * PMK or Passphrase (not both) - if both are null then an open (unencrypted) link is set up. 603 * @param passphrase Passphrase for the data-path. 607 int channel, byte[] peer, String interfaceName, byte[] pmk, String passphrase, 640 if (passphrase != null && passphrase.length() != 0) { 643 req.securityConfig.securityType = NanDataPathSecurityType.PASSPHRASE; 644 convertNativeByteArrayToArrayList(passphrase.getBytes(), req.securityConfig.passphrase); 662 * Responds to a data request from a peer. Security is provided by either PMK or Passphrase (no [all...] |
WifiAwareStateManager.java | 173 private static final String MESSAGE_BUNDLE_KEY_PASSPHRASE = "passphrase"; 471 String passphrase) { 481 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase); 489 byte[] pmk, String passphrase) { 496 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase); 1379 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local 1402 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local [all...] |
/external/openssh/ |
sshconnect1.c | 224 char buf[300], *passphrase, *comment, *authfile; local 265 * load the private key. Try first with empty passphrase; if it 266 * fails, ask for a passphrase. 275 "Enter passphrase for RSA key '%.100s': ", comment); 277 passphrase = read_passphrase(buf, 0); 278 if (strcmp(passphrase, "") != 0) { 280 authfile, passphrase, NULL, NULL); 283 debug2("no passphrase given, try next key"); 286 explicit_bzero(passphrase, strlen(passphrase)); [all...] |
ssh-keygen.c | 74 * Flag indicating that we just want to change the passphrase. This can be 110 /* This is set to the passphrase if given on the command line. */ 113 /* This is set to the new passphrase if given on the command line. */ 289 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN); 1235 * Perform changing a passphrase. The argument is the passwd structure 1251 /* Try to load the file with empty passphrase. */ 1352 char new_comment[1024], *comment, *passphrase; local [all...] |
sshconnect2.c | 1124 char prompt[300], *passphrase; local 1134 "Enter passphrase for key '%.100s': ", filename); 1137 passphrase = ""; 1139 passphrase = read_passphrase(prompt, 0); 1140 if (*passphrase == '\0') { 1141 debug2("no passphrase given, try next key"); 1142 free(passphrase); 1147 passphrase, &private, NULL, &perm_ok))) { 1156 debug2("bad passphrase given, try again..."); 1172 explicit_bzero(passphrase, strlen(passphrase)) [all...] |
sshkey.c | 3474 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 447 * Passphrase is NULL iff there is no i-th Tunnel-Password 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 488 os_free(passphrase);
|
/external/curl/src/ |
tool_getparam.c | 282 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon. 291 char **passphrase) 298 *passphrase = NULL; 305 * means no passphrase was given and no characters escaped */ 372 *passphrase = strdup(param_place); 1416 char *certname, *passphrase; local [all...] |
/external/curl/lib/ |
ssh.h | 113 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
/external/netperf/src/ |
netsh.c | 222 /* what is the passphrase? */ 223 char *passphrase = NULL; variable 240 -Z passphrase Expect passphrase as the first thing received\n\ 288 -Z passphrase Set and pass to netserver a passphrase\n"; 911 /* only copy as much of the passphrase as could fit in the 918 if (passphrase == NULL) 919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data)); 920 strncpy(passphrase, [all...] |
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
WifiAwareManagerFacade.java | 107 private static final String NS_KEY_PASSPHRASE = "passphrase"; 123 if (ns.passphrase != null) { 124 j.put(NS_KEY_PASSPHRASE, ns.passphrase); 138 String passphrase = null; local 162 passphrase = j.getString((NS_KEY_PASSPHRASE)); 166 passphrase); 494 @RpcParameter(name = "passphrase", description = "Passphrase of the data-path. Optional, can be empty/null.") 495 @RpcOptional String passphrase) throws JSONException { 506 if (passphrase == null || passphrase.length() == 0) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1073 char *passphrase; member in struct:passphrase_test [all...] |
/frameworks/base/wifi/tests/src/android/net/wifi/aware/ |
WifiAwareManagerTest.java | 942 final String passphrase = "A really bad password"; local 1023 final String passphrase = "A really bad password"; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 127 * passphrase - WPA2-Personal passphrase for the group (GO only) 129 char passphrase[64]; member in struct:p2p_go_neg_results 571 * passphrase_len - Passphrase length (8..63) 573 * This parameter controls the length of the random passphrase that is [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-jsch.jar | |
/prebuilts/eclipse/maven/apache-maven-3.2.1/lib/ |
maven-settings-3.2.1.jar | |
/prebuilts/misc/common/robolectric/lib/ |
maven-settings-2.2.1.jar | |
/prebuilts/tools/common/m2/repository/org/apache/maven/maven-settings/2.0.9/ |
maven-settings-2.0.9.jar | |