/external/curl/tests/unit/ |
unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 102 if(passphrase) { 103 if(strcmp(p[2], passphrase)) { 104 printf("expected passphrase '%s' but got '%s'" 105 "for -E param '%s'\n", p[2], passphrase, p[0]); 110 printf("expected passphrase '%s' but got NULL " 116 if(passphrase) { 117 printf("expected passphrase NULL but got '%s' 123 if(passphrase) free(passphrase); variable [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 23 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 24 "\nIf passphrase is left out, it will be read from " 32 passphrase = argv[2]; 34 printf("# reading passphrase from stdin\n"); 36 printf("Failed to read passphrase\n"); 48 passphrase = buf; 51 len = os_strlen(passphrase); 53 printf("Passphrase must be 8..63 characters\n") [all...] |
/frameworks/base/wifi/java/android/net/wifi/aware/ |
WifiAwareUtils.java | 58 * Validates that the passphrase is a non-null string of the right size (per the HAL min/max 61 * @param passphrase Passphrase to test 62 * @return true if passphrase is valid, false if not 64 public static boolean validatePassphrase(String passphrase) { 65 if (passphrase == null 66 || passphrase.length() < Constants.NanParamSizeLimits.MIN_PASSPHRASE_LENGTH 67 || passphrase.length() > Constants.NanParamSizeLimits.MAX_PASSPHRASE_LENGTH) {
|
WifiAwareNetworkSpecifier.java | 31 * {@link DiscoverySession#createNetworkSpecifierOpen(PeerHandle)} or their secure (Passphrase) 38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional 44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional 51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional 57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional 106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should 113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or 114 * passphrase should be specified. 117 public final String passphrase; field in class:WifiAwareNetworkSpecifier 130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
certificateutil.h | 43 // @param passphrase the private key passphrase 47 std::string passphrase); 51 // @param passphrase the private key passphrase to use 54 std::string passphrase);
|
certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]);
|
/system/connectivity/wificond/aidl/android/net/wifi/ |
IApInterface.aidl | 42 // @param passphrase string of bytes to use as the passphrase for this AP. 46 int encryptionType, in byte[] passphrase);
|
/external/openssh/contrib/ |
gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 88 char *passphrase, *local; local 168 /* Report passphrase if user selected OK */ 169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 171 local = g_locale_from_utf8(passphrase, strlen(passphrase), 178 puts(passphrase); 182 /* Zero passphrase in memory */ 183 memset(passphrase, '\b', strlen(passphrase)); 184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase:" [all...] |
/external/openssh/ |
authfile.h | 46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
|
/external/syslinux/gpxe/src/net/80211/ |
wpa_psk.c | 50 char passphrase[64+1]; local 56 &net80211_key_setting, passphrase, 60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx ); 65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ), 68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx, 69 passphrase );
|
/external/syslinux/gpxe/src/include/gpxe/ |
sha1.h | 20 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len,
|
/external/autotest/server/brillo/ |
host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): 59 @param passphrase: A string representing the passphrase to the ssid. 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
/external/autotest/server/site_tests/brillo_PingTest/ |
brillo_PingTest.py | 26 def run_once(self, host=None, ssid=None, passphrase=None, 34 @param passphrase: A string representing the passphrase to the ssid. 44 passphrase = global_config.global_config.get_config_value( 47 '-a WifiSetupService.Connect -e ssid %s -e passphrase %s' % 48 (ssid, passphrase))
|
/external/autotest/client/cros/scripts/ |
wifi | 38 print cmd, 'connect <ssid> [passphrase] [security]' 39 print ' |security| defaults to "psk" when |passphrase|', 49 print cmd, 'configure <ssid> [passphrase] [security]' 50 print ' |security| defaults to "psk" when |passphrase|', 55 def configure(ssid, security, passphrase): 58 if passphrase is not None: 59 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 78 like the passphrase for psk security. 129 like the passphrase for psk security. 186 passphrase = Non [all...] |
/external/curl/src/ |
tool_getparam.h | 56 char **passphrase);
|
/frameworks/opt/net/wifi/libwifi_system/include/wifi_system/ |
hostapd_manager.h | 53 // |passphrase| is ignored for kOpen networks. 62 const std::vector<uint8_t> passphrase);
|
/frameworks/opt/net/wifi/libwifi_system/testlib/include/wifi_system_test/ |
mock_hostapd_manager.h | 39 const std::vector<uint8_t> passphrase));
|
/external/openssh/contrib/cygwin/ |
ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/frameworks/opt/net/wifi/libwifi_system/ |
hostapd_manager.cpp | 54 const vector<uint8_t>& passphrase) { 59 if (PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(passphrase.data()), 60 passphrase.size(), 135 const vector<uint8_t> passphrase) { 157 string psk = GeneratePsk(ssid, passphrase);
|
/external/bison/build-aux/ |
gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv [all...] |
/external/syslinux/gpxe/src/crypto/ |
sha1extra.c | 84 * @v passphrase Passphrase from which to derive key 85 * @v pass_len Length of passphrase 94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len, 98 u8 pass[pass_len]; /* modifiable passphrase */ 108 memcpy ( pass, passphrase, pass_len ); 130 * @v passphrase Passphrase from which to derive key 131 * @v pass_len Length of passphrase 138 * This is used most notably in 802.11 WPA passphrase hashing, i [all...] |
/system/connectivity/wificond/ |
ap_interface_binder.h | 45 const std::vector<uint8_t>& passphrase,
|