/system/connectivity/wificond/ |
ap_interface_binder.h | 45 const std::vector<uint8_t>& passphrase,
|
ap_interface_binder.cpp | 60 const std::vector<uint8_t>& passphrase, 85 ssid, is_hidden, channel, encryption_type, passphrase);
|
ap_interface_impl.cpp | 117 const vector<uint8_t>& passphrase) { 119 interface_name_, ssid, is_hidden, channel, encryption_type, passphrase);
|
ap_interface_impl.h | 60 const std::vector<uint8_t>& passphrase);
|
/external/openssh/ |
key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, 360 key_load_private(const char *path, const char *passphrase, 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { 380 key_load_private_cert(int type, const char *filename, const char *passphrase, 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, 401 key_load_private_type(int type, const char *filename, const char *passphrase, 407 if ((r = sshkey_load_private_type(type, filename, passphrase,
|
authfile.c | 77 const char *passphrase, const char *comment, 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, 198 sshkey_load_private_type(int type, const char *filename, const char *passphrase, 221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); 228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, 240 passphrase, keyp, commentp)) != 0) 253 sshkey_load_private(const char *filename, const char *passphrase, 275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename, 438 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, 460 passphrase, &key, NULL, perm_ok)) != 0 | [all...] |
sshkey.h | 184 const char *passphrase, const char *comment, 189 const char *passphrase, const char *filename, struct sshkey **keyp, 192 const char *passphrase, struct sshkey **keyp, char **commentp);
|
sshconnect1.c | 224 char buf[300], *passphrase, *comment, *authfile; local 265 * load the private key. Try first with empty passphrase; if it 266 * fails, ask for a passphrase. 275 "Enter passphrase for RSA key '%.100s': ", comment); 277 passphrase = read_passphrase(buf, 0); 278 if (strcmp(passphrase, "") != 0) { 280 authfile, passphrase, NULL, NULL); 283 debug2("no passphrase given, try next key"); 286 explicit_bzero(passphrase, strlen(passphrase)); [all...] |
sshkey.c | 3474 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local [all...] |
/external/ImageMagick/www/api/ |
cipher.php | 129 MagickBooleanType DecipherImage(Image *image,const char *passphrase, 144 <dt>passphrase</dt> 145 <dd>decipher cipher pixels with this passphrase. </dd> 166 MagickBooleanType EncipherImage(Image *image,const char *passphrase, 181 <dt>passphrase</dt> 182 <dd>encipher pixels with this passphrase. </dd> 229 MagickBooleanType DecipherImage(Image *image,const char *passphrase, 244 <dt>passphrase</dt> 245 <dd>decipher cipher pixels with this passphrase. </dd> 266 MagickBooleanType EncipherImage(Image *image,const char *passphrase, [all...] |
/external/autotest/client/common_lib/cros/network/ |
xmlrpc_datatypes.py | 234 def __init__(self, guid, passphrase=None, autoconnect=None): 238 @param passphrase string optional psk passphrase. 246 self.passphrase = passphrase
|
/external/autotest/server/site_tests/brillo_WifiInterfaceTest/ |
brillo_WifiInterfaceTest.py | 45 def run_once(self, host=None, ssid=None, passphrase=None, wifi_iface=None, 51 @param passphrase: A string representing the passphrase to the ssid. 62 passphrase = global_config.global_config.get_config_value( 64 with host_utils.connect_to_ssid(host, ssid, passphrase):
|
/external/owasp/sanitizer/tools/ |
stage_to_maven_central.sh | 24 PASSPHRASE="$2" 29 echo "Usage: $0 <version> <passphrase>" 36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME." 54 if [ -z "$PASSPHRASE" ]; then 55 echo "Missing passphrase" 81 -Dgpg.passphrase="$PASSPHRASE" \
|
/external/netperf/src/ |
netperf.c | 143 if (passphrase != NULL) { 144 netperf_request.content.request_type = PASSPHRASE; 146 passphrase,
|
netserver.c | 204 /* char *passphrase = NULL; */ 698 error with receiving the passphrase */ 700 (netperf_request.content.request_type == PASSPHRASE) && 701 (!strcmp(passphrase, 707 netperf_response.content.response_type = PASSPHRASE; 711 "Sorry, unable to match with required passphrase\n"); 715 "Unable to match required passphrase. Closing control connection\n"); 740 /* if the netserver was started with a passphrase, look for it in 741 the first request to arrive. if there is no passphrase in the 745 if ((passphrase != NULL) && (recv_passphrase()) [all...] |
netsh.h | 80 extern char *passphrase;
|
/external/curl/lib/ |
ssh.h | 113 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 447 * Passphrase is NULL iff there is no i-th Tunnel-Password 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 488 os_free(passphrase);
|
/external/ImageMagick/MagickCore/ |
cipher.c | 516 % MagickBooleanType DecipherImage(Image *image,const char *passphrase, 523 % o passphrase: decipher cipher pixels with this passphrase. 547 const char *passphrase,ExceptionInfo *exception) 555 if (passphrase == (const char *) NULL) 557 passkey=StringToStringInfo(passphrase); 742 % MagickBooleanType EncipherImage(Image *image,const char *passphrase, 749 % o passphrase: encipher pixels with this passphrase. 758 const char *passphrase,ExceptionInfo *exception [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareNativeApi.java | 590 * PMK or Passphrase (not both) - if both are null then an open (unencrypted) link is set up. 603 * @param passphrase Passphrase for the data-path. 607 int channel, byte[] peer, String interfaceName, byte[] pmk, String passphrase, 640 if (passphrase != null && passphrase.length() != 0) { 643 req.securityConfig.securityType = NanDataPathSecurityType.PASSPHRASE; 644 convertNativeByteArrayToArrayList(passphrase.getBytes(), req.securityConfig.passphrase); 662 * Responds to a data request from a peer. Security is provided by either PMK or Passphrase (no [all...] |
/frameworks/base/wifi/java/android/net/wifi/aware/ |
WifiAwareManager.java | 425 PeerHandle peerHandle, @Nullable byte[] pmk, @Nullable String passphrase) { 430 + ", passphrase=" + ((passphrase == null) ? "null" : "non-null")); 456 passphrase); 461 @Nullable byte[] peer, @Nullable byte[] pmk, @Nullable String passphrase) { 465 + ", passphrase=" + ((passphrase == null) ? "null" : "non-null")); 493 passphrase); [all...] |
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/wifi/ |
WifiAwareManagerFacade.java | 107 private static final String NS_KEY_PASSPHRASE = "passphrase"; 123 if (ns.passphrase != null) { 124 j.put(NS_KEY_PASSPHRASE, ns.passphrase); 138 String passphrase = null; local 162 passphrase = j.getString((NS_KEY_PASSPHRASE)); 166 passphrase); 494 @RpcParameter(name = "passphrase", description = "Passphrase of the data-path. Optional, can be empty/null.") 495 @RpcOptional String passphrase) throws JSONException { 506 if (passphrase == null || passphrase.length() == 0) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase to the configuration fil [all...] |
/external/autotest/client/common_lib/cros/tendo/ |
privet_helper.py | 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}): 203 @param passphrase: string passphrase for network. 207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
|
/external/autotest/server/cros/ap_configurators/ |
asus_rtac68u_ap_configurator.py | 313 passphrase = '//input[@name="wl_wpa_psk" and @class="input_32_table"]' 323 self.set_content_of_text_field_by_xpath(shared_key, passphrase,
|