/external/e2fsprogs/misc/ |
e4crypt.c | 405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, 409 size_t passphrase_size = strlen(passphrase); 421 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, 433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); 435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); 442 * buf: [previous hash || passphrase] 468 static void get_passphrase(char *passphrase, int len) 475 p = fgets(passphrase, len, stdin); 482 p = strrchr(passphrase, '\n'); 484 p = passphrase + len - 1 [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 231 public void setPassphrase(String passphrase) { 232 mPassphrase = passphrase; 236 * Get the passphrase of the group. This function will return a valid passphrase only 237 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/hardware/interfaces/wifi/supplicant/1.0/ |
ISupplicantP2pIfaceCallback.hal | 159 * @param passphrase PSK passphrase used to secure the group. 165 uint8_t[32] psk, string passphrase, MacAddress goDeviceAddress,
|
/external/netperf/src/ |
netsh.c | 222 /* what is the passphrase? */ 223 char *passphrase = NULL; variable 240 -Z passphrase Expect passphrase as the first thing received\n\ 288 -Z passphrase Set and pass to netserver a passphrase\n"; 911 /* only copy as much of the passphrase as could fit in the 918 if (passphrase == NULL) 919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data)); 920 strncpy(passphrase, [all...] |
/external/openssh/ |
ssh-keygen.c | 74 * Flag indicating that we just want to change the passphrase. This can be 110 /* This is set to the passphrase if given on the command line. */ 113 /* This is set to the new passphrase if given on the command line. */ 289 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN); 1235 * Perform changing a passphrase. The argument is the passwd structure 1251 /* Try to load the file with empty passphrase. */ 1352 char new_comment[1024], *comment, *passphrase; local [all...] |
sshconnect2.c | 1124 char prompt[300], *passphrase; local 1134 "Enter passphrase for key '%.100s': ", filename); 1137 passphrase = ""; 1139 passphrase = read_passphrase(prompt, 0); 1140 if (*passphrase == '\0') { 1141 debug2("no passphrase given, try next key"); 1142 free(passphrase); 1147 passphrase, &private, NULL, &perm_ok))) { 1156 debug2("bad passphrase given, try again..."); 1172 explicit_bzero(passphrase, strlen(passphrase)) [all...] |
cipher.c | 484 * passphrase and using the resulting 16 bytes as the key. 488 const char *passphrase, int do_encrypt) 494 passphrase, strlen(passphrase),
|
/external/autotest/server/site_tests/network_WiFi_ProfileGUID/ |
network_WiFi_ProfileGUID.py | 111 passphrase=self.TEST_PASSWORD2)):
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 312 if (new_ssid->passphrase && ssid->passphrase && 313 os_strcmp(new_ssid->passphrase, ssid->passphrase) != 316 "WPS: M8 Creds with different passphrase - do not merge"); 328 if ((new_ssid->passphrase && !ssid->passphrase) || 329 (!new_ssid->passphrase && ssid->passphrase)) { 331 "WPS: M8 Creds with different passphrase/PSK type - do not merge") [all...] |
mesh.c | 293 if (ssid->passphrase == NULL) { 295 "mesh: Passphrase for SAE not configured"); 314 len = os_strlen(ssid->passphrase); 316 dup_binstr(ssid->passphrase, len);
|
p2p_supplicant.c | 1111 if (ssid->passphrase && !s->passphrase) 1113 else if (ssid->passphrase && s->passphrase && 1114 os_strcmp(ssid->passphrase, s->passphrase) != 0) 1148 if (ssid->passphrase) { 1149 os_free(s->passphrase); 1150 s->passphrase = os_strdup(ssid->passphrase); [all...] |
config.c | 450 str_clear_free(ssid->passphrase); 451 ssid->passphrase = NULL; 475 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 480 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 484 "Line %d: Invalid passphrase character", 488 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 489 os_memcmp(ssid->passphrase, value, len) == 0) { 494 str_clear_free(ssid->passphrase); 495 ssid->passphrase = dup_binstr(value, len) [all...] |
mesh_rsn.c | 317 if (ssid->passphrase == NULL) { 328 (u8 *) ssid->passphrase, 329 os_strlen(ssid->passphrase), sta->sae);
|
/frameworks/base/wifi/tests/src/android/net/wifi/aware/ |
WifiAwareManagerTest.java | 942 final String passphrase = "A really bad password"; local 1023 final String passphrase = "A really bad password"; local [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareStateManager.java | 173 private static final String MESSAGE_BUNDLE_KEY_PASSPHRASE = "passphrase"; 471 String passphrase) { 481 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase); 489 byte[] pmk, String passphrase) { 496 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase); 1379 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local 1402 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local [all...] |
/external/curl/src/ |
tool_getparam.c | 282 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon. 291 char **passphrase) 298 *passphrase = NULL; 305 * means no passphrase was given and no characters escaped */ 372 *passphrase = strdup(param_place); 1416 char *certname, *passphrase; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
sta_network.cpp | 689 if (wpa_ssid->passphrase) { 795 if (wpa_ssid->passphrase && 796 os_strlen(wpa_ssid->passphrase) == psk.size() && 797 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) { 804 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) { 817 str_clear_free(wpa_ssid->passphrase); 818 wpa_ssid->passphrase = nullptr; [all...] |
/hardware/interfaces/wifi/1.0/default/ |
hidl_struct_util.cpp | [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
ant-jsch.jar | |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/ |
SupplicantP2pIfaceCallback.java | 257 * @param passphrase PSK passphrase used to secure the group. 262 int frequency, byte[] psk, String passphrase, byte[] goDeviceAddress, 283 group.setPassphrase(passphrase);
|
/external/openssh/contrib/suse/ |
openssh.spec | 40 Summary: A passphrase dialog for OpenSSH and the X window System. 75 This package contains an X Window System passphrase dialog for OpenSSH.
|
/external/autotest/client/cros/networking/ |
shill_xmlrpc_server.py | 135 if params.passphrase is not None: 136 properties[shill.SERVICE_PROPERTY_PASSPHRASE] = params.passphrase
|
/external/openssh/contrib/redhat/ |
openssh.spec | 123 Summary: A passphrase dialog for OpenSSH and X. 129 Summary: A passphrase dialog for OpenSSH, X, and GNOME. 165 an X11 passphrase dialog for OpenSSH. 170 an X11 passphrase dialog for OpenSSH and the GNOME GUI desktop
|
/external/autotest/client/site_tests/power_Consumption/ |
power_Consumption.py | 389 passphrase=wifi_pw,
|
/external/wpa_supplicant_8/src/ap/ |
ap_config.h | 141 char passphrase[MAX_PASSPHRASE_LEN + 1]; member in struct:hostapd_sta_wpa_psk_short
|