HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 26 - 50 of 131) sorted by null

12 3 4 5 6

  /system/connectivity/wificond/
ap_interface_binder.h 45 const std::vector<uint8_t>& passphrase,
ap_interface_binder.cpp 60 const std::vector<uint8_t>& passphrase,
85 ssid, is_hidden, channel, encryption_type, passphrase);
ap_interface_impl.cpp 117 const vector<uint8_t>& passphrase) {
119 interface_name_, ssid, is_hidden, channel, encryption_type, passphrase);
ap_interface_impl.h 60 const std::vector<uint8_t>& passphrase);
  /external/openssh/
key.c 294 key_save_private(Key *key, const char *filename, const char *passphrase,
300 if ((r = sshkey_save_private(key, filename, passphrase, comment,
360 key_load_private(const char *path, const char *passphrase,
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) {
380 key_load_private_cert(int type, const char *filename, const char *passphrase,
386 if ((r = sshkey_load_private_cert(type, filename, passphrase,
401 key_load_private_type(int type, const char *filename, const char *passphrase,
407 if ((r = sshkey_load_private_type(type, filename, passphrase,
authfile.c 77 const char *passphrase, const char *comment,
85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment,
198 sshkey_load_private_type(int type, const char *filename, const char *passphrase,
221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp);
228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
240 passphrase, keyp, commentp)) != 0)
253 sshkey_load_private(const char *filename, const char *passphrase,
275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename,
438 sshkey_load_private_cert(int type, const char *filename, const char *passphrase,
460 passphrase, &key, NULL, perm_ok)) != 0 |
    [all...]
sshkey.h 184 const char *passphrase, const char *comment,
189 const char *passphrase, const char *filename, struct sshkey **keyp,
192 const char *passphrase, struct sshkey **keyp, char **commentp);
sshconnect1.c 224 char buf[300], *passphrase, *comment, *authfile; local
265 * load the private key. Try first with empty passphrase; if it
266 * fails, ask for a passphrase.
275 "Enter passphrase for RSA key '%.100s': ", comment);
277 passphrase = read_passphrase(buf, 0);
278 if (strcmp(passphrase, "") != 0) {
280 authfile, passphrase, NULL, NULL);
283 debug2("no passphrase given, try next key");
286 explicit_bzero(passphrase, strlen(passphrase));
    [all...]
sshkey.c 3474 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
    [all...]
  /external/ImageMagick/www/api/
cipher.php 129 MagickBooleanType DecipherImage(Image *image,const char *passphrase,
144 <dt>passphrase</dt>
145 <dd>decipher cipher pixels with this passphrase. </dd>
166 MagickBooleanType EncipherImage(Image *image,const char *passphrase,
181 <dt>passphrase</dt>
182 <dd>encipher pixels with this passphrase. </dd>
229 MagickBooleanType DecipherImage(Image *image,const char *passphrase,
244 <dt>passphrase</dt>
245 <dd>decipher cipher pixels with this passphrase. </dd>
266 MagickBooleanType EncipherImage(Image *image,const char *passphrase,
    [all...]
  /external/autotest/client/common_lib/cros/network/
xmlrpc_datatypes.py 234 def __init__(self, guid, passphrase=None, autoconnect=None):
238 @param passphrase string optional psk passphrase.
246 self.passphrase = passphrase
  /external/autotest/server/site_tests/brillo_WifiInterfaceTest/
brillo_WifiInterfaceTest.py 45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None,
51 @param passphrase: A string representing the passphrase to the ssid.
62 passphrase = global_config.global_config.get_config_value(
64 with host_utils.connect_to_ssid(host, ssid, passphrase):
  /external/owasp/sanitizer/tools/
stage_to_maven_central.sh 24 PASSPHRASE="$2"
29 echo "Usage: $0 <version> <passphrase>"
36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME."
54 if [ -z "$PASSPHRASE" ]; then
55 echo "Missing passphrase"
81 -Dgpg.passphrase="$PASSPHRASE" \
  /external/netperf/src/
netperf.c 143 if (passphrase != NULL) {
144 netperf_request.content.request_type = PASSPHRASE;
146 passphrase,
netserver.c 204 /* char *passphrase = NULL; */
698 error with receiving the passphrase */
700 (netperf_request.content.request_type == PASSPHRASE) &&
701 (!strcmp(passphrase,
707 netperf_response.content.response_type = PASSPHRASE;
711 "Sorry, unable to match with required passphrase\n");
715 "Unable to match required passphrase. Closing control connection\n");
740 /* if the netserver was started with a passphrase, look for it in
741 the first request to arrive. if there is no passphrase in the
745 if ((passphrase != NULL) && (recv_passphrase())
    [all...]
netsh.h 80 extern char *passphrase;
  /external/curl/lib/
ssh.h 113 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
447 * Passphrase is NULL iff there is no i-th Tunnel-Password
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
488 os_free(passphrase);
  /external/ImageMagick/MagickCore/
cipher.c 516 % MagickBooleanType DecipherImage(Image *image,const char *passphrase,
523 % o passphrase: decipher cipher pixels with this passphrase.
547 const char *passphrase,ExceptionInfo *exception)
555 if (passphrase == (const char *) NULL)
557 passkey=StringToStringInfo(passphrase);
742 % MagickBooleanType EncipherImage(Image *image,const char *passphrase,
749 % o passphrase: encipher pixels with this passphrase.
758 const char *passphrase,ExceptionInfo *exception
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
WifiAwareNativeApi.java 590 * PMK or Passphrase (not both) - if both are null then an open (unencrypted) link is set up.
603 * @param passphrase Passphrase for the data-path.
607 int channel, byte[] peer, String interfaceName, byte[] pmk, String passphrase,
640 if (passphrase != null && passphrase.length() != 0) {
643 req.securityConfig.securityType = NanDataPathSecurityType.PASSPHRASE;
644 convertNativeByteArrayToArrayList(passphrase.getBytes(), req.securityConfig.passphrase);
662 * Responds to a data request from a peer. Security is provided by either PMK or Passphrase (no
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/aware/
WifiAwareManager.java 425 PeerHandle peerHandle, @Nullable byte[] pmk, @Nullable String passphrase) {
430 + ", passphrase=" + ((passphrase == null) ? "null" : "non-null"));
456 passphrase);
461 @Nullable byte[] peer, @Nullable byte[] pmk, @Nullable String passphrase) {
465 + ", passphrase=" + ((passphrase == null) ? "null" : "non-null"));
493 passphrase);
    [all...]
  /external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/
WifiAwareManagerFacade.java 107 private static final String NS_KEY_PASSPHRASE = "passphrase";
123 if (ns.passphrase != null) {
124 j.put(NS_KEY_PASSPHRASE, ns.passphrase);
138 String passphrase = null; local
162 passphrase = j.getString((NS_KEY_PASSPHRASE));
166 passphrase);
494 @RpcParameter(name = "passphrase", description = "Passphrase of the data-path. Optional, can be empty/null.")
495 @RpcOptional String passphrase) throws JSONException {
506 if (passphrase == null || passphrase.length() == 0)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 164 * passphrase - WPA ASCII passphrase
166 * If this is set, psk will be generated using the SSID and passphrase
167 * configured for the network. ASCII passphrase must be between 8 and
170 char *passphrase; member in struct:wpa_ssid
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase to the configuration fil
    [all...]
  /external/autotest/client/common_lib/cros/tendo/
privet_helper.py 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}):
203 @param passphrase: string passphrase for network.
207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
  /external/autotest/server/cros/ap_configurators/
asus_rtac68u_ap_configurator.py 313 passphrase = '//input[@name="wl_wpa_psk" and @class="input_32_table"]'
323 self.set_content_of_text_field_by_xpath(shared_key, passphrase,

Completed in 656 milliseconds

12 3 4 5 6