HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 1 - 25 of 485) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/hostapd/
hostapd.radius_clients 2 10.1.2.3 secret passphrase
3 192.168.1.0/24 another very secret passphrase
hostapd.wpa_psk 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
6 00:00:00:00:00:00 secret passphrase
7 00:11:22:33:44:55 another passphrase
9 00:00:00:00:00:00 another passphrase for all STAs
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
23 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
24 "\nIf passphrase is left out, it will be read from "
32 passphrase = argv[2];
34 printf("# reading passphrase from stdin\n");
36 printf("Failed to read passphrase\n");
48 passphrase = buf;
51 len = os_strlen(passphrase);
53 printf("Passphrase must be 8..63 characters\n")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_passphrase.sgml 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
16 <arg><replaceable>passphrase</replaceable></arg>
25 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
35 <para>The SSID whose passphrase should be derived.</para>
40 <term>passphrase</term>
42 <para>The passphrase to use. If not included on the command line,
43 passphrase will be read from standard input.</para>
  /external/curl/docs/cmdline-opts/
pass.d 6 Passphrase for the private key
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 11 psk="secret passphrase"
  /external/curl/tests/unit/
unit1394.c 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
102 if(passphrase) {
103 if(strcmp(p[2], passphrase)) {
104 printf("expected passphrase '%s' but got '%s'"
105 "for -E param '%s'\n", p[2], passphrase, p[0]);
110 printf("expected passphrase '%s' but got NULL "
116 if(passphrase) {
117 printf("expected passphrase NULL but got '%s'
123 if(passphrase) free(passphrase); variable
    [all...]
  /external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
ShadowWifiP2pGroup.java 19 public void setPassphrase(String passphrase) {
20 directlyOn(realObject, WifiP2pGroup.class).setInterface(passphrase);
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid,
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
  /frameworks/base/wifi/java/android/net/wifi/aware/
WifiAwareNetworkSpecifier.java 31 * {@link DiscoverySession#createNetworkSpecifierOpen(PeerHandle)} or their secure (Passphrase)
38 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional
44 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional
51 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional
57 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional
106 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should
113 * The Passphrase of the requested data-path. Can be null. Only one or none of the pmk or
114 * passphrase should be specified.
117 public final String passphrase; field in class:WifiAwareNetworkSpecifier
130 byte[] peerMac, byte[] pmk, String passphrase, int requestorUid)
    [all...]
WifiAwareUtils.java 60 * Validates that the passphrase is a non-null string of the right size (per the HAL min/max
63 * @param passphrase Passphrase to test
64 * @return true if passphrase is valid, false if not
66 public static boolean validatePassphrase(String passphrase) {
67 if (passphrase == null
68 || passphrase.length() < Constants.NanParamSizeLimits.MIN_PASSPHRASE_LENGTH
69 || passphrase.length() > Constants.NanParamSizeLimits.MAX_PASSPHRASE_LENGTH) {
  /external/autotest/server/site_tests/brillo_PingTest/
brillo_PingTest.py 26 def run_once(self, host=None, ssid=None, passphrase=None,
34 @param passphrase: A string representing the passphrase to the ssid.
44 passphrase = global_config.global_config.get_config_value(
47 '-a WifiSetupService.Connect -e ssid %s -e passphrase %s' %
48 (ssid, passphrase))
  /external/google-tv-pairing-protocol/cpp/src/polo/util/
certificateutil.h 43 // @param passphrase the private key passphrase
47 std::string passphrase);
51 // @param passphrase the private key passphrase to use
54 std::string passphrase);
certificateutil.cc 55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
  /external/syslinux/gpxe/src/net/80211/
wpa_psk.c 50 char passphrase[64+1]; local
56 &net80211_key_setting, passphrase,
60 DBGC ( ctx, "WPA-PSK %p: no passphrase provided!\n", ctx );
65 pbkdf2_sha1 ( passphrase, len, dev->essid, strlen ( dev->essid ),
68 DBGC ( ctx, "WPA-PSK %p: derived PMK from passphrase `%s':\n", ctx,
69 passphrase );
  /external/autotest/server/cros/ap_configurators/
trendnet691gr_ap_configurator.py 30 wait_for_xpath='id("passphrase")')
31 self.set_content_of_text_field_by_id(shared_key, 'passphrase')
  /external/owasp/sanitizer/tools/
stage_to_maven_central.sh 24 PASSPHRASE="$2"
29 echo "Usage: $0 <version> <passphrase>"
36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME."
54 if [ -z "$PASSPHRASE" ]; then
55 echo "Missing passphrase"
81 -Dgpg.passphrase="$PASSPHRASE" \
  /external/syslinux/gpxe/src/include/gpxe/
sha1.h 20 void pbkdf2_sha1 ( const void *passphrase, size_t pass_len,
  /external/autotest/client/cros/scripts/
wifi 36 print cmd, 'connect <ssid> [passphrase] [security]'
37 print ' |security| defaults to "psk" when |passphrase|',
47 print cmd, 'configure <ssid> [passphrase] [security]'
48 print ' |security| defaults to "psk" when |passphrase|',
53 def configure(ssid, security, passphrase):
56 if passphrase is not None:
57 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
76 like the passphrase for psk security.
127 like the passphrase for psk security.
184 passphrase = Non
    [all...]
  /external/scapy/scapy/modules/krack/
__init__.py 11 passphrase="testtest", # Associated passphrase
15 passphrase.
  /external/syslinux/gpxe/src/crypto/
sha1extra.c 84 * @v passphrase Passphrase from which to derive key
85 * @v pass_len Length of passphrase
94 static void pbkdf2_sha1_f ( const void *passphrase, size_t pass_len,
98 u8 pass[pass_len]; /* modifiable passphrase */
108 memcpy ( pass, passphrase, pass_len );
130 * @v passphrase Passphrase from which to derive key
131 * @v pass_len Length of passphrase
138 * This is used most notably in 802.11 WPA passphrase hashing, i
    [all...]
  /external/autotest/server/brillo/
host_utils.py 53 def connect_to_ssid(host, ssid, passphrase):
59 @param passphrase: A string representing the passphrase to the ssid.
86 if passphrase:
87 wifi_cmd += ' --passphrase=%s' % passphrase
  /external/autotest/client/common_lib/cros/network/
apmanager_constants.py 14 CONFIG_PASSPHRASE = 'Passphrase'
  /external/iproute2/man/man8/
ip-sr.8 37 The \fBip sr hmac set\fR command prompts for a passphrase that will be used as the
38 HMAC secret for the corresponding key ID. A blank passphrase removes the mapping.
  /external/testng/
README.dev 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy
36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform

Completed in 1354 milliseconds

1 2 3 4 5 6 7 8 91011>>