/external/dropbear/ |
H A D | keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase, 39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
|
H A D | keyimport.c | 53 static sign_key *openssh_read(const char *filename, char *passphrase); 55 char *passphrase); 62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase); 64 char *passphrase); 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { argument 82 return openssh_read(filename, passphrase); 87 return sshcom_read(filename, passphrase); 93 int import_write(const char *filename, sign_key *key, char *passphrase, argument 97 return openssh_write(filename, key, passphrase); 102 return sshcom_write(filename, key, passphrase); 509 openssh_read(const char *filename, char *passphrase) argument 693 openssh_write(const char *filename, sign_key *key, char *passphrase) argument [all...] |
/external/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 25 char *ssid, *passphrase, buf[64], *pos; local 28 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 29 "\nIf passphrase is left out, it will be read from " 37 passphrase = argv[2]; 39 printf("# reading passphrase from stdin\n"); 41 printf("Failed to read passphrase\n"); 53 passphrase = buf; 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | sha1.h | 30 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len,
|
H A D | config.c | 331 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 336 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 338 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 339 os_memcmp(ssid->passphrase, value, len) == 0) 342 os_free(ssid->passphrase); 343 ssid->passphrase = os_malloc(len + 1); 344 if (ssid->passphrase == NULL) 346 os_memcpy(ssid->passphrase, value, len); 347 ssid->passphrase[le [all...] |
H A D | config_ssid.h | 157 * passphrase - WPA ASCII passphrase 159 * If this is set, psk will be generated using the SSID and passphrase 160 * configured for the network. ASCII passphrase must be between 8 and 163 char *passphrase; member in struct:wpa_ssid 689 * pending_req_passphrase - Pending passphrase request 767 * be set (either directly or using ASCII passphrase).
|
H A D | sha1.c | 301 static void pbkdf2_sha1_f(const char *passphrase, const char *ssid, argument 310 size_t passphrase_len = os_strlen(passphrase); 327 hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, tmp); 331 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN, 342 * @passphrase: ASCII passphrase 353 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, argument 363 pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, count,
|
H A D | config_file.c | 100 if (ssid->passphrase) { 103 "passphrase configured.", line);
|
H A D | config_winreg.c | 258 if (ssid->passphrase) { 260 wpa_printf(MSG_ERROR, "Both PSK and passphrase "
|
H A D | ctrl_iface_dbus_handlers.c | 966 (strcmp(entry.key, "ssid") == 0 && ssid->passphrase))
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 25 char *ssid, *passphrase, buf[64], *pos; local 28 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 29 "\nIf passphrase is left out, it will be read from " 37 passphrase = argv[2]; 39 printf("# reading passphrase from stdin\n"); 41 printf("Failed to read passphrase\n"); 53 passphrase = buf; 56 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | config_ssid.h | 131 * passphrase - WPA ASCII passphrase 133 * If this is set, psk will be generated using the SSID and passphrase 134 * configured for the network. ASCII passphrase must be between 8 and 137 char *passphrase; member in struct:wpa_ssid 279 * be set (either directly or using ASCII passphrase).
|
H A D | config.c | 357 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase " 362 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 364 if (ssid->passphrase && os_strlen(ssid->passphrase) == len && 365 os_memcmp(ssid->passphrase, value, len) == 0) 368 os_free(ssid->passphrase); 369 ssid->passphrase = os_malloc(len + 1); 370 if (ssid->passphrase == NULL) 372 os_memcpy(ssid->passphrase, value, len); 373 ssid->passphrase[le [all...] |
H A D | wps_supplicant.c | 353 os_free(ssid->passphrase); 354 ssid->passphrase = os_malloc(cred->key_len + 1); 355 if (ssid->passphrase == NULL) 357 os_memcpy(ssid->passphrase, cred->key, cred->key_len); 358 ssid->passphrase[cred->key_len] = '\0';
|
H A D | wpa_supplicant.c | 1139 params.passphrase = ssid->passphrase;
|
H A D | config_file.c | 101 if (ssid->passphrase) { 104 "passphrase configured.", line);
|
H A D | config_winreg.c | 322 if (ssid->passphrase) { 324 wpa_printf(MSG_ERROR, "Both PSK and passphrase "
|
H A D | ctrl_iface_dbus_handlers.c | 1024 (strcmp(entry.key, "ssid") == 0 && ssid->passphrase))
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_ps3.c | 32 if (!params->psk && !params->passphrase) { 49 } else if (params->passphrase) { 51 iwr.u.data.length = strlen(params->passphrase) + 3; 56 os_memcpy(buf + 1, params->passphrase, iwr.u.data.length - 3);
|
H A D | driver_osx.m | 239 if (params->passphrase == NULL) 242 params->passphrase,
|
H A D | driver.h | 272 * passphrase - RSN passphrase for PSK 276 * the 8..63 character ASCII passphrase, if available. Please note that 277 * this can be %NULL if passphrase was not used to generate the PSK. In 280 const char *passphrase; member in struct:wpa_driver_associate_params 283 * psk - RSN PSK (alternative for passphrase for PSK)
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | sha1.h | 31 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len,
|
H A D | sha1.c | 304 static void pbkdf2_sha1_f(const char *passphrase, const char *ssid, argument 313 size_t passphrase_len = os_strlen(passphrase); 330 hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, tmp); 334 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN, 345 * @passphrase: ASCII passphrase 356 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len, argument 366 pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations, count,
|
/external/wpa_supplicant/tests/ |
H A D | test_sha1.c | 232 char *passphrase; member in struct:passphrase_test 316 pbkdf2_sha1(test->passphrase,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_sha1.c | 251 char *passphrase; member in struct:passphrase_test 335 pbkdf2_sha1(test->passphrase,
|