HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 1 - 25 of 134) sorted by null

1 2 3 4 5 6

  /external/curl/tests/unit/
unit1394.c 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
102 if(passphrase) {
103 if(strcmp(p[2], passphrase)) {
104 printf("expected passphrase '%s' but got '%s'"
105 "for -E param '%s'\n", p[2], passphrase, p[0]);
110 printf("expected passphrase '%s' but got NULL "
116 if(passphrase) {
117 printf("expected passphrase NULL but got '%s'
123 if(passphrase) free(passphrase); variable
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
23 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
24 "\nIf passphrase is left out, it will be read from "
32 passphrase = argv[2];
34 printf("# reading passphrase from stdin\n");
36 printf("Failed to read passphrase\n");
48 passphrase = buf;
51 len = os_strlen(passphrase);
53 printf("Passphrase must be 8..63 characters\n")
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/aware/
WifiAwareUtils.java 58 * Validates that the passphrase is a non-null string of the right size (per the HAL min/max
61 * @param passphrase Passphrase to test
62 * @return true if passphrase is valid, false if not
64 public static boolean validatePassphrase(String passphrase) {
65 if (passphrase == null
66 || passphrase.length() < Constants.NanParamSizeLimits.MIN_PASSPHRASE_LENGTH
67 || passphrase.length() > Constants.NanParamSizeLimits.MAX_PASSPHRASE_LENGTH) {
WifiAwareNetworkSpecifier.java 31 * {@link DiscoverySession#createNetworkSpecifierOpen(PeerHandle)} or their secure (Passphrase)
38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional
44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional
51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional
57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional
106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should
113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or
114 * passphrase should be specified.
117 public final String passphrase; field in class:WifiAwareNetworkSpecifier
130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.h 43 // @param passphrase the private key passphrase
47 std::string passphrase);
51 // @param passphrase the private key passphrase to use
54 std::string passphrase);
certificateutil.cc 55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
  /system/connectivity/wificond/aidl/android/net/wifi/
IApInterface.aidl 42 // @param passphrase string of bytes to use as the passphrase for this AP.
46 int encryptionType, in byte[] passphrase);
  /external/openssh/contrib/
gnome-ssh-askpass2.c 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
88 char *passphrase, *local; local
168 /* Report passphrase if user selected OK */
169 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
171 local = g_locale_from_utf8(passphrase, strlen(passphrase),
178 puts(passphrase);
182 /* Zero passphrase in memory */
183 memset(passphrase, '\b', strlen(passphrase));
184 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
    [all...]
gnome-ssh-askpass1.c 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase:"
    [all...]
  /external/openssh/
authfile.h 46 int sshkey_load_private_type_fd(int fd, int type, const char *passphrase,
  /external/syslinux/gpxe/src/net/80211/
wpa_psk.c 50 char passphrase[64+1]; local
56 &net80211_key_setting, passphrase,
60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx );
65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ),
68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx,
69 passphrase );
  /external/syslinux/gpxe/src/include/gpxe/
sha1.h 20 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len,
  /external/autotest/server/brillo/
host_utils.py 53 def connect_to_ssid(host, ssid, passphrase):
59 @param passphrase: A string representing the passphrase to the ssid.
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
  /external/autotest/server/site_tests/brillo_PingTest/
brillo_PingTest.py 26 def run_once(self, host=None, ssid=None, passphrase=None,
34 @param passphrase: A string representing the passphrase to the ssid.
44 passphrase = global_config.global_config.get_config_value(
47 '-a WifiSetupService.Connect -e ssid %s -e passphrase %s' %
48 (ssid, passphrase))
  /external/autotest/client/cros/scripts/
wifi 38 print cmd, 'connect <ssid> [passphrase] [security]'
39 print ' |security| defaults to "psk" when |passphrase|',
49 print cmd, 'configure <ssid> [passphrase] [security]'
50 print ' |security| defaults to "psk" when |passphrase|',
55 def configure(ssid, security, passphrase):
58 if passphrase is not None:
59 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
78 like the passphrase for psk security.
129 like the passphrase for psk security.
186 passphrase = Non
    [all...]
  /external/curl/src/
tool_getparam.h 56 char **passphrase);
  /frameworks/opt/net/wifi/libwifi_system/include/wifi_system/
hostapd_manager.h 53 // |passphrase| is ignored for kOpen networks.
62 const std::vector<uint8_t> passphrase);
  /frameworks/opt/net/wifi/libwifi_system/testlib/include/wifi_system_test/
mock_hostapd_manager.h 39 const std::vector<uint8_t> passphrase));
  /external/openssh/contrib/cygwin/
ssh-user-config 37 passphrase=""
57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null
219 -p | --passphrase )
221 passphrase=$1
234 echo " --passphrase -p word Use \"word\" as passphrase automatically."
  /frameworks/opt/net/wifi/libwifi_system/
hostapd_manager.cpp 54 const vector<uint8_t>& passphrase) {
59 if (PKCS5_PBKDF2_HMAC_SHA1(reinterpret_cast<const char*>(passphrase.data()),
60 passphrase.size(),
135 const vector<uint8_t> passphrase) {
157 string psk = GeneratePsk(ssid, passphrase);
  /external/bison/build-aux/
gnupload 224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv
    [all...]
  /external/syslinux/gpxe/src/crypto/
sha1extra.c 84 * @v passphrase Passphrase from which to derive key
85 * @v pass_len Length of passphrase
94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len,
98 u8 pass[pass_len]; /* modifiable passphrase */
108 memcpy ( pass, passphrase, pass_len );
130 * @v passphrase Passphrase from which to derive key
131 * @v pass_len Length of passphrase
138 * This is used most notably in 802.11 WPA passphrase hashing, i
    [all...]
  /system/connectivity/wificond/
ap_interface_binder.h 45 const std::vector<uint8_t>& passphrase,

Completed in 487 milliseconds

1 2 3 4 5 6