HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 51 - 75 of 131) sorted by null

1 23 4 5 6

  /external/e2fsprogs/misc/
e4crypt.c 405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt,
409 size_t passphrase_size = strlen(passphrase);
421 printf("Passphrase size is %zd; max is %d.\n", passphrase_size,
433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size);
435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size);
442 * buf: [previous hash || passphrase]
468 static void get_passphrase(char *passphrase, int len)
475 p = fgets(passphrase, len, stdin);
482 p = strrchr(passphrase, '\n');
484 p = passphrase + len - 1
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
231 public void setPassphrase(String passphrase) {
232 mPassphrase = passphrase;
236 * Get the passphrase of the group. This function will return a valid passphrase only
237 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /hardware/interfaces/wifi/supplicant/1.0/
ISupplicantP2pIfaceCallback.hal 159 * @param passphrase PSK passphrase used to secure the group.
165 uint8_t[32] psk, string passphrase, MacAddress goDeviceAddress,
  /external/netperf/src/
netsh.c 222 /* what is the passphrase? */
223 char *passphrase = NULL; variable
240 -Z passphrase Expect passphrase as the first thing received\n\
288 -Z passphrase Set and pass to netserver a passphrase\n";
911 /* only copy as much of the passphrase as could fit in the
918 if (passphrase == NULL)
919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data));
920 strncpy(passphrase,
    [all...]
  /external/openssh/
ssh-keygen.c 74 * Flag indicating that we just want to change the passphrase. This can be
110 /* This is set to the passphrase if given on the command line. */
113 /* This is set to the new passphrase if given on the command line. */
289 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN);
1235 * Perform changing a passphrase. The argument is the passwd structure
1251 /* Try to load the file with empty passphrase. */
1352 char new_comment[1024], *comment, *passphrase; local
    [all...]
sshconnect2.c 1124 char prompt[300], *passphrase; local
1134 "Enter passphrase for key '%.100s': ", filename);
1137 passphrase = "";
1139 passphrase = read_passphrase(prompt, 0);
1140 if (*passphrase == '\0') {
1141 debug2("no passphrase given, try next key");
1142 free(passphrase);
1147 passphrase, &private, NULL, &perm_ok))) {
1156 debug2("bad passphrase given, try again...");
1172 explicit_bzero(passphrase, strlen(passphrase))
    [all...]
cipher.c 484 * passphrase and using the resulting 16 bytes as the key.
488 const char *passphrase, int do_encrypt)
494 passphrase, strlen(passphrase),
  /external/autotest/server/site_tests/network_WiFi_ProfileGUID/
network_WiFi_ProfileGUID.py 111 passphrase=self.TEST_PASSWORD2)):
  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.c 312 if (new_ssid->passphrase && ssid->passphrase &&
313 os_strcmp(new_ssid->passphrase, ssid->passphrase) !=
316 "WPS: M8 Creds with different passphrase - do not merge");
328 if ((new_ssid->passphrase && !ssid->passphrase) ||
329 (!new_ssid->passphrase && ssid->passphrase)) {
331 "WPS: M8 Creds with different passphrase/PSK type - do not merge")
    [all...]
mesh.c 293 if (ssid->passphrase == NULL) {
295 "mesh: Passphrase for SAE not configured");
314 len = os_strlen(ssid->passphrase);
316 dup_binstr(ssid->passphrase, len);
p2p_supplicant.c 1111 if (ssid->passphrase && !s->passphrase)
1113 else if (ssid->passphrase && s->passphrase &&
1114 os_strcmp(ssid->passphrase, s->passphrase) != 0)
1148 if (ssid->passphrase) {
1149 os_free(s->passphrase);
1150 s->passphrase = os_strdup(ssid->passphrase);
    [all...]
config.c 450 str_clear_free(ssid->passphrase);
451 ssid->passphrase = NULL;
475 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
480 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
484 "Line %d: Invalid passphrase character",
488 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
489 os_memcmp(ssid->passphrase, value, len) == 0) {
494 str_clear_free(ssid->passphrase);
495 ssid->passphrase = dup_binstr(value, len)
    [all...]
mesh_rsn.c 317 if (ssid->passphrase == NULL) {
328 (u8 *) ssid->passphrase,
329 os_strlen(ssid->passphrase), sta->sae);
  /frameworks/base/wifi/tests/src/android/net/wifi/aware/
WifiAwareManagerTest.java 942 final String passphrase = "A really bad password"; local
1023 final String passphrase = "A really bad password"; local
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
WifiAwareStateManager.java 173 private static final String MESSAGE_BUNDLE_KEY_PASSPHRASE = "passphrase";
471 String passphrase) {
481 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase);
489 byte[] pmk, String passphrase) {
496 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase);
1379 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local
1402 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local
    [all...]
  /external/curl/src/
tool_getparam.c 282 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon.
291 char **passphrase)
298 *passphrase = NULL;
305 * means no passphrase was given and no characters escaped */
372 *passphrase = strdup(param_place);
1416 char *certname, *passphrase; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
sta_network.cpp 689 if (wpa_ssid->passphrase) {
795 if (wpa_ssid->passphrase &&
796 os_strlen(wpa_ssid->passphrase) == psk.size() &&
797 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) {
804 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) {
817 str_clear_free(wpa_ssid->passphrase);
818 wpa_ssid->passphrase = nullptr;
    [all...]
  /hardware/interfaces/wifi/1.0/default/
hidl_struct_util.cpp     [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
ant-jsch.jar 
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/
SupplicantP2pIfaceCallback.java 257 * @param passphrase PSK passphrase used to secure the group.
262 int frequency, byte[] psk, String passphrase, byte[] goDeviceAddress,
283 group.setPassphrase(passphrase);
  /external/openssh/contrib/suse/
openssh.spec 40 Summary: A passphrase dialog for OpenSSH and the X window System.
75 This package contains an X Window System passphrase dialog for OpenSSH.
  /external/autotest/client/cros/networking/
shill_xmlrpc_server.py 135 if params.passphrase is not None:
136 properties[shill.SERVICE_PROPERTY_PASSPHRASE] = params.passphrase
  /external/openssh/contrib/redhat/
openssh.spec 123 Summary: A passphrase dialog for OpenSSH and X.
129 Summary: A passphrase dialog for OpenSSH, X, and GNOME.
165 an X11 passphrase dialog for OpenSSH.
170 an X11 passphrase dialog for OpenSSH and the GNOME GUI desktop
  /external/autotest/client/site_tests/power_Consumption/
power_Consumption.py 389 passphrase=wifi_pw,
  /external/wpa_supplicant_8/src/ap/
ap_config.h 141 char passphrase[MAX_PASSPHRASE_LEN + 1]; member in struct:hostapd_sta_wpa_psk_short

Completed in 217 milliseconds

1 23 4 5 6