HomeSort by relevance Sort by last modified time
    Searched refs:passphrase (Results 51 - 75 of 134) sorted by null

1 23 4 5 6

  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 164 * passphrase - WPA ASCII passphrase
166 * If this is set, psk will be generated using the SSID and passphrase
167 * configured for the network. ASCII passphrase must be between 8 and
170 char *passphrase; member in struct:wpa_ssid
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase to the configuration fil
    [all...]
wps_supplicant.c 312 if (new_ssid->passphrase && ssid->passphrase &&
313 os_strcmp(new_ssid->passphrase, ssid->passphrase) !=
316 "WPS: M8 Creds with different passphrase - do not merge");
328 if ((new_ssid->passphrase && !ssid->passphrase) ||
329 (!new_ssid->passphrase && ssid->passphrase)) {
331 "WPS: M8 Creds with different passphrase/PSK type - do not merge")
    [all...]
mesh.c 293 if (ssid->passphrase == NULL) {
295 "mesh: Passphrase for SAE not configured");
314 len = os_strlen(ssid->passphrase);
316 dup_binstr(ssid->passphrase, len);
p2p_supplicant.c 1111 if (ssid->passphrase && !s->passphrase)
1113 else if (ssid->passphrase && s->passphrase &&
1114 os_strcmp(ssid->passphrase, s->passphrase) != 0)
1148 if (ssid->passphrase) {
1149 os_free(s->passphrase);
1150 s->passphrase = os_strdup(ssid->passphrase);
    [all...]
config.c 450 str_clear_free(ssid->passphrase);
451 ssid->passphrase = NULL;
475 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
480 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
484 "Line %d: Invalid passphrase character",
488 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
489 os_memcmp(ssid->passphrase, value, len) == 0) {
494 str_clear_free(ssid->passphrase);
495 ssid->passphrase = dup_binstr(value, len)
    [all...]
  /external/openssh/
sshkey.c 3515 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local
    [all...]
ssh-keygen.c 76 * Flag indicating that we just want to change the passphrase. This can be
112 /* This is set to the passphrase if given on the command line. */
115 /* This is set to the new passphrase if given on the command line. */
291 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN);
1404 char new_comment[1024], *comment, *passphrase; local
    [all...]
sshconnect2.c 1232 char prompt[300], *passphrase, *comment local
    [all...]
cipher.c 544 * passphrase and using the resulting 16 bytes as the key.
548 const struct sshcipher *cipher, const char *passphrase, int do_encrypt)
554 passphrase, strlen(passphrase),
  /external/autotest/client/common_lib/cros/tendo/
privet_helper.py 199 def setup_add_wifi_credentials(self, ssid, passphrase, data={}):
203 @param passphrase: string passphrase for network.
207 data['wifi'] = {'ssid': ssid, 'passphrase': passphrase}
  /external/autotest/server/cros/ap_configurators/
asus_rtac68u_ap_configurator.py 313 passphrase = '//input[@name="wl_wpa_psk" and @class="input_32_table"]'
323 self.set_content_of_text_field_by_xpath(shared_key, passphrase,
  /external/e2fsprogs/misc/
e4crypt.c 405 static void pbkdf2_sha512(const char *passphrase, struct salt *salt,
409 size_t passphrase_size = strlen(passphrase);
421 printf("Passphrase size is %zd; max is %d.\n", passphrase_size,
433 memcpy(&saltbuf[EXT4_MAX_SALT_SIZE], passphrase, passphrase_size);
435 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size);
442 * buf: [previous hash || passphrase]
468 static void get_passphrase(char *passphrase, int len)
475 p = fgets(passphrase, len, stdin);
482 p = strrchr(passphrase, '\n');
484 p = passphrase + len - 1
    [all...]
  /external/f2fs-tools/tools/
f2fscrypt.c 445 static void pbkdf2_sha512(const char *passphrase, struct salt *salt,
449 size_t passphrase_size = strlen(passphrase);
461 printf("Passphrase size is %zd; max is %d.\n", passphrase_size,
473 memcpy(&saltbuf[F2FS_MAX_SALT_SIZE], passphrase, passphrase_size);
475 memcpy(&buf[SHA512_LENGTH], passphrase, passphrase_size);
482 * buf: [previous hash || passphrase]
508 static void get_passphrase(char *passphrase, int len)
515 p = fgets(passphrase, len, stdin);
522 p = strrchr(passphrase, '\n');
524 p = passphrase + len - 1
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 60 /** The passphrase used for WPA2-PSK */
73 "(?:passphrase=)?(?:\"(.{0,63})\")? " +
86 * passphrase="fKG4jMe3"] go_dev_addr=fa:7b:7a:42:02:13 [PERSISTENT]
231 public void setPassphrase(String passphrase) {
232 mPassphrase = passphrase;
236 * Get the passphrase of the group. This function will return a valid passphrase only
237 * at the group owner. Legacy Wi-Fi clients will need this passphrase alongside
  /hardware/interfaces/wifi/supplicant/1.0/
ISupplicantP2pIfaceCallback.hal 159 * @param passphrase PSK passphrase used to secure the group.
165 uint8_t[32] psk, string passphrase, MacAddress goDeviceAddress,
  /tools/test/connectivity/acts/tests/google/wifi/aware/functional/
DataPathTest.py 35 PASSPHRASE = "This is some random passphrase - very very secure!!"
39 PASSPHRASE2 = "This is some random passphrase - very very secure - but diff!!"
144 passphrase_to_use: The passphrase to use if encr_type=ENCR_TYPE_PASSPHRASE
145 If None then use self.PASSPHRASE
150 passphrase = None
153 passphrase = self.PASSPHRASE if passphrase_to_use == None else passphrase_to_use
161 use_peer_id else None, passphrase, pmk))
167 passphrase, pmk)
    [all...]
  /external/netperf/src/
netsh.c 222 /* what is the passphrase? */
223 char *passphrase = NULL; variable
240 -Z passphrase Expect passphrase as the first thing received\n\
288 -Z passphrase Set and pass to netserver a passphrase\n";
911 /* only copy as much of the passphrase as could fit in the
918 if (passphrase == NULL)
919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data));
920 strncpy(passphrase,
    [all...]
  /frameworks/base/wifi/tests/src/android/net/wifi/aware/
WifiAwareManagerTest.java 943 final String passphrase = "A really bad password"; local
1024 final String passphrase = "A really bad password"; local
    [all...]
  /external/autotest/server/site_tests/network_WiFi_ProfileGUID/
network_WiFi_ProfileGUID.py 111 passphrase=self.TEST_PASSWORD2)):
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
WifiAwareStateManager.java 186 private static final String MESSAGE_BUNDLE_KEY_PASSPHRASE = "passphrase";
656 String passphrase, boolean isOutOfBand) {
666 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase);
675 byte[] pmk, String passphrase, boolean isOutOfBand) {
682 msg.getData().putString(MESSAGE_BUNDLE_KEY_PASSPHRASE, passphrase);
1580 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local
1604 String passphrase = data.getString(MESSAGE_BUNDLE_KEY_PASSPHRASE); local
    [all...]
  /external/curl/src/
tool_getparam.c 303 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon.
312 char **passphrase)
319 *passphrase = NULL;
328 * means no passphrase was given and no characters escaped */
396 *passphrase = strdup(param_place);
408 char *certname, *passphrase; local
409 parse_cert_parameter(nextarg, &certname, &passphrase);
412 if(passphrase) {
414 *password = passphrase;
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
sta_network.cpp 689 if (wpa_ssid->passphrase) {
795 if (wpa_ssid->passphrase &&
796 os_strlen(wpa_ssid->passphrase) == psk.size() &&
797 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) {
804 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) {
817 str_clear_free(wpa_ssid->passphrase);
818 wpa_ssid->passphrase = nullptr;
    [all...]
  /hardware/interfaces/wifi/1.1/default/
hidl_struct_util.cpp     [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/
SupplicantP2pIfaceCallback.java 252 * @param passphrase PSK passphrase used to secure the group.
257 int frequency, byte[] psk, String passphrase, byte[] goDeviceAddress,
278 group.setPassphrase(passphrase);
  /external/openssh/contrib/suse/
openssh.spec 40 Summary: A passphrase dialog for OpenSSH and the X window System.
75 This package contains an X Window System passphrase dialog for OpenSSH.

Completed in 993 milliseconds

1 23 4 5 6