HomeSort by relevance Sort by last modified time
    Searched defs:passphrase (Results 1 - 25 of 53) sorted by null

1 2 3

  /external/curl/tests/unit/
unit1394.c 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
102 if(passphrase) {
103 if(strcmp(p[2], passphrase)) {
104 printf("expected passphrase '%s' but got '%s'"
105 "for -E param '%s'\n", p[2], passphrase, p[0]);
110 printf("expected passphrase '%s' but got NULL "
116 if(passphrase) {
117 printf("expected passphrase NULL but got '%s'
123 if(passphrase) free(passphrase); variable
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
23 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
24 "\nIf passphrase is left out, it will be read from "
32 passphrase = argv[2];
34 printf("# reading passphrase from stdin\n");
36 printf("Failed to read passphrase\n");
48 passphrase = buf;
51 len = os_strlen(passphrase);
53 printf("Passphrase must be 8..63 characters\n")
    [all...]
config_ssid.h 164 * passphrase - WPA ASCII passphrase
166 * If this is set, psk will be generated using the SSID and passphrase
167 * configured for the network. ASCII passphrase must be between 8 and
170 char *passphrase; member in struct:wpa_ssid
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase to the configuration fil
    [all...]
  /external/syslinux/gpxe/src/net/80211/
wpa_psk.c 50 char passphrase[64+1]; local
56 &net80211_key_setting, passphrase,
60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx );
65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ),
68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx,
69 passphrase );
  /external/openssh/contrib/
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/aware/
WifiAwareNetworkSpecifier.java 30 * {@link DiscoverySession#createNetworkSpecifierOpen(PeerHandle)} or their secure (Passphrase)
37 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional
43 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional
50 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional
56 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional
105 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should
112 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or
113 * passphrase should be specified.
116 public final String passphrase; field in class:WifiAwareNetworkSpecifier
120 byte[] peerMac, byte[] pmk, String passphrase) {
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
WifiAwareNativeApi.java 590 * PMK or Passphrase (not both) - if both are null then an open (unencrypted) link is set up.
603 * @param passphrase Passphrase for the data-path.
607 int channel, byte[] peer, String interfaceName, byte[] pmk, String passphrase,
640 if (passphrase != null && passphrase.length() != 0) {
643 req.securityConfig.securityType = NanDataPathSecurityType.PASSPHRASE;
644 convertNativeByteArrayToArrayList(passphrase.getBytes(), req.securityConfig.passphrase);
662 * Responds to a data request from a peer. Security is provided by either PMK or Passphrase (no
    [all...]
WifiAwareStateManager.java 173 private static final String MESSAGE_BUNDLE_KEY_PASSPHRASE = "passphrase";
471 String passphrase) {
481 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase);
489 byte[] pmk, String passphrase) {
496 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase);
1379 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local
1402 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local
    [all...]
  /external/openssh/
sshconnect1.c 224 char buf[300], *passphrase, *comment, *authfile; local
265 * load the private key. Try first with empty passphrase; if it
266 * fails, ask for a passphrase.
275 "Enter passphrase for RSA key '%.100s': ", comment);
277 passphrase = read_passphrase(buf, 0);
278 if (strcmp(passphrase, "") != 0) {
280 authfile, passphrase, NULL, NULL);
283 debug2("no passphrase given, try next key");
286 explicit_bzero(passphrase, strlen(passphrase));
    [all...]
ssh-keygen.c 74 * Flag indicating that we just want to change the passphrase. This can be
110 /* This is set to the passphrase if given on the command line. */
113 /* This is set to the new passphrase if given on the command line. */
289 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN);
1235 * Perform changing a passphrase. The argument is the passwd structure
1251 /* Try to load the file with empty passphrase. */
1352 char new_comment[1024], *comment, *passphrase; local
    [all...]
sshconnect2.c 1124 char prompt[300], *passphrase; local
1134 "Enter passphrase for key '%.100s': ", filename);
1137 passphrase = "";
1139 passphrase = read_passphrase(prompt, 0);
1140 if (*passphrase == '\0') {
1141 debug2("no passphrase given, try next key");
1142 free(passphrase);
1147 passphrase, &private, NULL, &perm_ok))) {
1156 debug2("bad passphrase given, try again...");
1172 explicit_bzero(passphrase, strlen(passphrase))
    [all...]
sshkey.c 3474 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
447 * Passphrase is NULL iff there is no i-th Tunnel-Password
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
488 os_free(passphrase);
  /external/curl/src/
tool_getparam.c 282 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon.
291 char **passphrase)
298 *passphrase = NULL;
305 * means no passphrase was given and no characters escaped */
372 *passphrase = strdup(param_place);
1416 char *certname, *passphrase; local
    [all...]
  /external/curl/lib/
ssh.h 113 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
  /external/netperf/src/
netsh.c 222 /* what is the passphrase? */
223 char *passphrase = NULL; variable
240 -Z passphrase Expect passphrase as the first thing received\n\
288 -Z passphrase Set and pass to netserver a passphrase\n";
911 /* only copy as much of the passphrase as could fit in the
918 if (passphrase == NULL)
919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data));
920 strncpy(passphrase,
    [all...]
  /external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
WifiAwareManagerFacade.java 107 private static final String NS_KEY_PASSPHRASE = "passphrase";
123 if (ns.passphrase != null) {
124 j.put(NS_KEY_PASSPHRASE, ns.passphrase);
138 String passphrase = null; local
162 passphrase = j.getString((NS_KEY_PASSPHRASE));
166 passphrase);
494 @RpcParameter(name = "passphrase", description = "Passphrase of the data-path. Optional, can be empty/null.")
495 @RpcOptional String passphrase) throws JSONException {
506 if (passphrase == null || passphrase.length() == 0)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 1073 char *passphrase; member in struct:passphrase_test
    [all...]
  /frameworks/base/wifi/tests/src/android/net/wifi/aware/
WifiAwareManagerTest.java 942 final String passphrase = "A really bad password"; local
1023 final String passphrase = "A really bad password"; local
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p.h 127 * passphrase - WPA2-Personal passphrase for the group (GO only)
129 char passphrase[64]; member in struct:p2p_go_neg_results
571 * passphrase_len - Passphrase length (8..63)
573 * This parameter controls the length of the random passphrase that is
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
ant-jsch.jar 
  /prebuilts/eclipse/maven/apache-maven-3.2.1/lib/
maven-settings-3.2.1.jar 
  /prebuilts/misc/common/robolectric/lib/
maven-settings-2.2.1.jar 
  /prebuilts/tools/common/m2/repository/org/apache/maven/maven-settings/2.0.9/
maven-settings-2.0.9.jar 

Completed in 2030 milliseconds

1 2 3