| /external/wpa_supplicant_8/hostapd/ |
| hostapd.radius_clients | 2 10.1.2.3 secret passphrase 3 192.168.1.0/24 another very secret passphrase
|
| hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 6 00:00:00:00:00:00 secret passphrase 7 00:11:22:33:44:55 another passphrase 9 00:00:00:00:00:00 another passphrase for all STAs
|
| /external/wpa_supplicant_8/wpa_supplicant/ |
| wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 23 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 24 "\nIf passphrase is left out, it will be read from " 32 passphrase = argv[2]; 34 printf("# reading passphrase from stdin\n"); 36 printf("Failed to read passphrase\n"); 48 passphrase = buf; 51 len = os_strlen(passphrase); 53 printf("Passphrase must be 8..63 characters\n") [all...] |
| /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
| wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 16 <arg><replaceable>passphrase</replaceable></arg> 25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 35 <para>The SSID whose passphrase should be derived.</para> 40 <term>passphrase</term> 42 <para>The passphrase to use. If not included on the command line, 43 passphrase will be read from standard input.</para>
|
| /external/curl/docs/cmdline-opts/ |
| pass.d | 6 Passphrase for the private key
|
| /external/wpa_supplicant_8/wpa_supplicant/examples/ |
| wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
| /external/curl/tests/unit/ |
| unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 102 if(passphrase) { 103 if(strcmp(p[2], passphrase)) { 104 printf("expected passphrase '%s' but got '%s'" 105 "for -E param '%s'\n", p[2], passphrase, p[0]); 110 printf("expected passphrase '%s' but got NULL " 116 if(passphrase) { 117 printf("expected passphrase NULL but got '%s' 123 if(passphrase) free(passphrase); variable [all...] |
| /external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
| ShadowWifiP2pGroup.java | 19 public void setPassphrase(String passphrase) { 20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase);
|
| /external/wpa_supplicant_8/src/crypto/ |
| sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
| /frameworks/base/wifi/java/android/net/wifi/aware/ |
| WifiAwareNetworkSpecifier.java | 31 * {@link DiscoverySession#createNetworkSpecifierOpen(PeerHandle)} or their secure (Passphrase) 38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional 44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional 51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional 57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional 106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should 113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or 114 * passphrase should be specified. 117 public final String passphrase; field in class:WifiAwareNetworkSpecifier 130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid) [all...] |
| WifiAwareUtils.java | 60 * Validates that the passphrase is a non-null string of the right size (per the HAL min/max 63 * @param passphrase Passphrase to test 64 * @return true if passphrase is valid, false if not 66 public static boolean validatePassphrase(String passphrase) { 67 if (passphrase == null 68 || passphrase.length() < Constants.NanParamSizeLimits.MIN_PASSPHRASE_LENGTH 69 || passphrase.length() > Constants.NanParamSizeLimits.MAX_PASSPHRASE_LENGTH) {
|
| /external/autotest/server/site_tests/brillo_PingTest/ |
| brillo_PingTest.py | 26 def run_once(self, host=None, ssid=None, passphrase=None, 34 @param passphrase: A string representing the passphrase to the ssid. 44 passphrase = global_config.global_config.get_config_value( 47 '-a WifiSetupService.Connect -e ssid %s -e passphrase %s' % 48 (ssid, passphrase))
|
| /external/google-tv-pairing-protocol/cpp/src/polo/util/ |
| certificateutil.h | 43 // @param passphrase the private key passphrase 47 std::string passphrase); 51 // @param passphrase the private key passphrase to use 54 std::string passphrase);
|
| certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]);
|
| /external/syslinux/gpxe/src/net/80211/ |
| wpa_psk.c | 50 char passphrase[64+1]; local 56 &net80211_key_setting, passphrase, 60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx ); 65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ), 68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx, 69 passphrase );
|
| /external/autotest/server/cros/ap_configurators/ |
| trendnet691gr_ap_configurator.py | 30 wait_for_xpath='id("passphrase")') 31 self.set_content_of_text_field_by_id(shared_key, 'passphrase')
|
| /external/owasp/sanitizer/tools/ |
| stage_to_maven_central.sh | 24 PASSPHRASE="$2" 29 echo "Usage: $0 <version> <passphrase>" 36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME." 54 if [ -z "$PASSPHRASE" ]; then 55 echo "Missing passphrase" 81 -Dgpg.passphrase="$PASSPHRASE" \
|
| /external/syslinux/gpxe/src/include/gpxe/ |
| sha1.h | 20 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len,
|
| /external/autotest/client/cros/scripts/ |
| wifi | 36 print cmd, 'connect <ssid> [passphrase] [security]' 37 print ' |security| defaults to "psk" when |passphrase|', 47 print cmd, 'configure <ssid> [passphrase] [security]' 48 print ' |security| defaults to "psk" when |passphrase|', 53 def configure(ssid, security, passphrase): 56 if passphrase is not None: 57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 76 like the passphrase for psk security. 127 like the passphrase for psk security. 184 passphrase = Non [all...] |
| /external/scapy/scapy/modules/krack/ |
| __init__.py | 11 passphrase="testtest", # Associated passphrase 15 passphrase.
|
| /external/syslinux/gpxe/src/crypto/ |
| sha1extra.c | 84 * @v passphrase Passphrase from which to derive key 85 * @v pass_len Length of passphrase 94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len, 98 u8 pass[pass_len]; /* modifiable passphrase */ 108 memcpy ( pass, passphrase, pass_len ); 130 * @v passphrase Passphrase from which to derive key 131 * @v pass_len Length of passphrase 138 * This is used most notably in 802.11 WPA passphrase hashing, i [all...] |
| /external/autotest/server/brillo/ |
| host_utils.py | 53 def connect_to_ssid(host, ssid, passphrase): 59 @param passphrase: A string representing the passphrase to the ssid. 86 if passphrase: 87 wifi_cmd += ' --passphrase=%s' % passphrase
|
| /external/autotest/client/common_lib/cros/network/ |
| apmanager_constants.py | 14 CONFIG_PASSPHRASE = 'Passphrase'
|
| /external/iproute2/man/man8/ |
| ip-sr.8 | 37 The \fBip sr hmac set\fR command prompts for a passphrase that will be used as the 38 HMAC secret for the corresponding key ID. A blank passphrase removes the mapping.
|
| /external/testng/ |
| README.dev | 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy 36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
|