/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase to the configuration fil [all...] |
wps_supplicant.c | 312 if (new_ssid->passphrase && ssid->passphrase && 313 os_strcmp(new_ssid->passphrase, ssid->passphrase) != 316 "WPS: M8 Creds with different passphrase - do not merge"); 328 if ((new_ssid->passphrase && !ssid->passphrase) || 329 (!new_ssid->passphrase && ssid->passphrase)) { 331 "WPS: M8 Creds with different passphrase/PSK type - do not merge") [all...] |
mesh.c | 293 if (ssid->passphrase == NULL) { 295 "mesh: Passphrase for SAE not configured"); 314 len = os_strlen(ssid->passphrase); 316 dup_binstr(ssid->passphrase, len);
|
p2p_supplicant.c | 1111 if (ssid->passphrase && !s->passphrase) 1113 else if (ssid->passphrase && s->passphrase && 1114 os_strcmp(ssid->passphrase, s->passphrase) != 0) 1148 if (ssid->passphrase) { 1149 os_free(s->passphrase); 1150 s->passphrase = os_strdup(ssid->passphrase); [all...] |
config.c | 450 str_clear_free(ssid->passphrase); 451 ssid->passphrase = NULL; 475 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 480 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 484 "Line %d: Invalid passphrase character", 488 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 489 os_memcmp(ssid->passphrase, value, len) == 0) { 494 str_clear_free(ssid->passphrase); 495 ssid->passphrase = dup_binstr(value, len) [all...] |
/external/openssh/ |
sshkey.c | 3515 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local [all...] |
ssh-keygen.c | 76 * Flag indicating that we just want to change the passphrase. This can be 112 /* This is set to the passphrase if given on the command line. */ 115 /* This is set to the new passphrase if given on the command line. */ 291 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN); 1404 char new_comment[1024], *comment, *passphrase; local [all...] |
sshconnect2.c | 1232 char prompt[300], *passphrase, *comment local [all...] |
cipher.c | 544 * passphrase and using the resulting 16 bytes as the key. 548 const struct sshcipher *cipher, const char *passphrase, int do_encrypt) 554 passphrase, strlen(passphrase),
|
/external/autotest/client/common_lib/cros/tendo/ |
privet_helper.py | 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}): 203 @param passphrase: string passphrase for network. 207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
|
/external/autotest/server/cros/ap_configurators/ |
asus_rtac68u_ap_configurator.py | 313 passphrase = '//input[@name="wl_wpa_psk" and @class="input_32_table"]' 323 self.set_content_of_text_field_by_xpath(shared_key, passphrase,
|
/external/e2fsprogs/misc/ |
e4crypt.c | 405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, 409 size_t passphrase_size = strlen(passphrase); 421 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, 433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size); 435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); 442 * buf: [previous hash || passphrase] 468 static void get_passphrase(char *passphrase, int len) 475 p = fgets(passphrase, len, stdin); 482 p = strrchr(passphrase, '\n'); 484 p = passphrase + len - 1 [all...] |
/external/f2fs-tools/tools/ |
f2fscrypt.c | 445 static void pbkdf2_sha512(const char *passphrase, struct salt *salt, 449 size_t passphrase_size = strlen(passphrase); 461 printf("Passphrase size is %zd; max is %d.\n", passphrase_size, 473 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size); 475 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size); 482 * buf: [previous hash || passphrase] 508 static void get_passphrase(char *passphrase, int len) 515 p = fgets(passphrase, len, stdin); 522 p = strrchr(passphrase, '\n'); 524 p = passphrase + len - 1 [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 60 /** The passphrase used for WPA2-PSK */ 73 "(?:passphrase=)?(?:\"(.{0,63})\")? " + 86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT] 231 public void setPassphrase(String passphrase) { 232 mPassphrase = passphrase; 236 * Get the passphrase of the group. This function will return a valid passphrase only 237 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
|
/hardware/interfaces/wifi/supplicant/1.0/ |
ISupplicantP2pIfaceCallback.hal | 159 * @param passphrase PSK passphrase used to secure the group. 165 uint8_t[32] psk, string passphrase, MacAddress goDeviceAddress,
|
/tools/test/connectivity/acts/tests/google/wifi/aware/functional/ |
DataPathTest.py | 35 PASSPHRASE = "This is some random passphrase - very very secure!!" 39 PASSPHRASE2 = "This is some random passphrase - very very secure - but diff!!" 144 passphrase_to_use: The passphrase to use if encr_type=ENCR_TYPE_PASSPHRASE 145 If None then use self.PASSPHRASE 150 passphrase = None 153 passphrase = self.PASSPHRASE if passphrase_to_use == None else passphrase_to_use 161 use_peer_id else None, passphrase, pmk)) 167 passphrase, pmk) [all...] |
/external/netperf/src/ |
netsh.c | 222 /* what is the passphrase? */ 223 char *passphrase = NULL; variable 240 -Z passphrase Expect passphrase as the first thing received\n\ 288 -Z passphrase Set and pass to netserver a passphrase\n"; 911 /* only copy as much of the passphrase as could fit in the 918 if (passphrase == NULL) 919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data)); 920 strncpy(passphrase, [all...] |
/frameworks/base/wifi/tests/src/android/net/wifi/aware/ |
WifiAwareManagerTest.java | 943 final String passphrase = "A really bad password"; local 1024 final String passphrase = "A really bad password"; local [all...] |
/external/autotest/server/site_tests/network_WiFi_ProfileGUID/ |
network_WiFi_ProfileGUID.py | 111 passphrase=self.TEST_PASSWORD2)):
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
WifiAwareStateManager.java | 186 private static final String MESSAGE_BUNDLE_KEY_PASSPHRASE = "passphrase"; 656 String passphrase, boolean isOutOfBand) { 666 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase); 675 byte[] pmk, String passphrase, boolean isOutOfBand) { 682 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase); 1580 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local 1604 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local [all...] |
/external/curl/src/ |
tool_getparam.c | 303 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon. 312 char **passphrase) 319 *passphrase = NULL; 328 * means no passphrase was given and no characters escaped */ 396 *passphrase = strdup(param_place); 408 char *certname, *passphrase; local 409 parse_cert_parameter(nextarg, &certname, &passphrase); 412 if(passphrase) { 414 *password = passphrase; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
sta_network.cpp | 689 if (wpa_ssid->passphrase) { 795 if (wpa_ssid->passphrase && 796 os_strlen(wpa_ssid->passphrase) == psk.size() && 797 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) { 804 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) { 817 str_clear_free(wpa_ssid->passphrase); 818 wpa_ssid->passphrase = nullptr; [all...] |
/hardware/interfaces/wifi/1.1/default/ |
hidl_struct_util.cpp | [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/ |
SupplicantP2pIfaceCallback.java | 252 * @param passphrase PSK passphrase used to secure the group. 257 int frequency, byte[] psk, String passphrase, byte[] goDeviceAddress, 278 group.setPassphrase(passphrase);
|
/external/openssh/contrib/suse/ |
openssh.spec | 40 Summary: A passphrase dialog for OpenSSH and the X window System. 75 This package contains an X Window System passphrase dialog for OpenSSH.
|