/external/dropbear/ |
H A D | keyimport.h | 37 int import_write(const char *filename, sign_key *key, char *passphrase, 39 sign_key *import_read(const char *filename, char *passphrase, int filetype);
|
H A D | keyimport.c | 53 static sign_key *openssh_read(const char *filename, char *passphrase); 55 char *passphrase); 62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase); 64 char *passphrase); 79 sign_key *import_read(const char *filename, char *passphrase, int filetype) { argument 82 return openssh_read(filename, passphrase); 87 return sshcom_read(filename, passphrase); 93 int import_write(const char *filename, sign_key *key, char *passphrase, argument 97 return openssh_write(filename, key, passphrase); 102 return sshcom_write(filename, key, passphrase); 509 openssh_read(const char *filename, char *passphrase) argument 693 openssh_write(const char *filename, sign_key *key, char *passphrase) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
/external/chromium_org/crypto/ |
H A D | openpgp_symmetric_encryption.h | 35 base::StringPiece passphrase, 39 base::StringPiece passphrase);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | sha1.h | 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
/external/openssh/contrib/ |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
/external/chromium_org/chrome/browser/sync/test/integration/ |
H A D | passwords_helper.h | 41 // Sets the cryptographer's encryption passphrase for the profile at index 42 // |index| to |passphrase|, and passphrase type |type|. 44 const std::string& passphrase, 47 // Sets the cryptographer's decryption passphrase for the profile at index 48 // |index| to |passphrase|. Returns false if the operation failed, and true 50 bool SetDecryptionPassphrase(int index, const std::string& passphrase);
|
/external/chromium_org/sync/internal_api/public/ |
H A D | sync_encryption_handler.h | 22 // Reasons due to which Cryptographer might require a passphrase. 26 // passphrase for its first attempt at 30 // passphrase for its first attempt at 34 // The different states for the encryption passphrase. These control if and how 35 // the user should be prompted for a decryption passphrase. 37 IMPLICIT_PASSPHRASE = 0, // GAIA-based passphrase (deprecated). 38 KEYSTORE_PASSPHRASE = 1, // Keystore passphrase. 39 FROZEN_IMPLICIT_PASSPHRASE = 2, // Frozen GAIA passphrase. 40 CUSTOM_PASSPHRASE = 3, // User-provided passphrase. 62 // Called when user interaction is required to obtain a valid passphrase [all...] |
/external/chromium_org/sync/test/ |
H A D | fake_sync_encryption_handler.h | 35 virtual void SetEncryptionPassphrase(const std::string& passphrase, 37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
|
H A D | fake_sync_encryption_handler.cc | 100 const std::string& passphrase, 107 const std::string& passphrase) { 99 SetEncryptionPassphrase( const std::string& passphrase, bool is_explicit) argument 106 SetDecryptionPassphrase( const std::string& passphrase) argument
|
/external/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 37 passphrase="" 57 ssh-keygen -t "${type}" -N "${passphrase}" -f "${pwdhome}/.ssh/${file}" > /dev/null 219 -p | --passphrase ) 221 passphrase=$1 238 echo " --passphrase -p word Use \"word\" as passphrase automatically."
|
/external/openssh/ |
H A D | authfile.c | 7 * for reading the passphrase from the user. 80 * passphrase. The identification of the blob (lowest 64 bits of n) will 82 * passphrase. 85 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, argument 96 * If the passphrase is empty, use SSH_CIPHER_NONE to ease converting 99 cipher_num = (strcmp(passphrase, "") == 0) ? 107 /* Put checkbytes for checking passphrase validity. */ 150 cipher_set_key_string(&ciphercontext, cipher, passphrase, 174 u_char *passphrase = (len > 0) ? (u_char *)_passphrase : NULL; local 184 error("passphrase to 241 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument 258 key_save_private(Key *key, const char *filename, const char *passphrase, const char *comment) argument 418 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument 519 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument 596 key_load_private_pem(int fd, int type, const char *passphrase, char **commentp) argument 641 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument 660 key_load_private_type(int type, const char *filename, const char *passphrase, char **commentp, int *perm_ok) argument 698 key_parse_private(Buffer *buffer, const char *filename, const char *passphrase, char **commentp) argument 721 key_load_private(const char *filename, const char *passphrase, char **commentp) argument 845 key_load_private_cert(int type, const char *filename, const char *passphrase, int *perm_ok) argument [all...] |
/external/chromium/chrome/browser/ui/webui/options/ |
H A D | sync_setup_handler.cc | 127 !result->GetString("passphrase", &config->secondary_passphrase)) 133 bool GetPassphrase(const std::string& json, std::string* passphrase) { argument 139 return result->GetString("passphrase", passphrase); 144 std::string* passphrase) { 151 result->GetString("passphrase", passphrase); 321 StringValue page("passphrase"); 422 std::string passphrase; 423 if (!GetPassphrase(json, &passphrase)) { 142 GetFirstPassphrase(const std::string& json, std::string* option, std::string* passphrase) argument 448 std::string passphrase; local [all...] |
/external/bison/build-aux/ |
H A D | gnupload | 224 # for the passphrase if the script will fail. 243 # Make sure passphrase is not exported in the environment. 244 unset passphrase 249 # 'echo $passphrase' to output the passphrase, so it is important that 255 PATH=/empty echo -n "Enter GPG passphrase: " 257 read -r passphrase 260 passphrase_fd_0="--passphrase-fd 0" 268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file 326 echo "$passphrase" | [all...] |
/external/chromium_org/sync/internal_api/ |
H A D | sync_encryption_handler_impl.h | 60 virtual void SetEncryptionPassphrase(const std::string& passphrase, 62 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE; 157 // explicit passphrase state (if the cryptographer is ready). 175 // Sets a new custom passphrase. Should only be called if a custom passphrase 178 // passphrase already existed. 179 void SetCustomPassphrase(const std::string& passphrase, 182 // Decrypt the encryption keybag using a user provided passphrase. 183 // Should only be called if the current passphrase is a frozen implicit 184 // passphrase o [all...] |
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_utils.h | 45 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an 48 const std::string& passphrase, 93 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs| 101 const std::string& passphrase,
|
/external/chromium/chrome/browser/resources/options/ |
H A D | sync_setup_overlay.css | 19 #sync-passphrase-container { 23 #sync-custom-passphrase { 27 #sync-passphrase-message { 31 .sync-custom-passphrase-input { 115 #passphrase-encryption-message { 120 #passphrase-input { 153 #sync-passphrase-warning {
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/sync/ |
H A D | ProfileSyncService.java | 182 * Checks if a password or a passphrase is required for decryption of sync data. 184 * Returns NONE if the state is unavailable, or decryption passphrase/password is not required. 186 * @return the enum describing the decryption passphrase type required 192 // passphrase type we should tell the user we need. 202 * Returns the actual passphrase type being used for encryption. The sync backend must be 206 * should ask the user for a passphrase, you should instead use 221 * Returns true if the current explicit passphrase time is defined. 248 * Checks if sync is currently set to use a custom passphrase. The sync backend must be running 251 * @return true if sync is using a custom passphrase. 259 * Checks if we need a passphrase t 318 setEncryptionPassphrase(String passphrase, boolean isGaia) argument 328 setDecryptionPassphrase(String passphrase) argument 515 nativeSetDecryptionPassphrase( int nativeProfileSyncServiceAndroid, String passphrase) argument 517 nativeSetEncryptionPassphrase( int nativeProfileSyncServiceAndroid, String passphrase, boolean isGaia) argument [all...] |
/external/chromium/chrome/browser/sync/ |
H A D | sync_setup_flow.h | 63 // Fills |args| for the enter passphrase screen. 85 // The 'passphrase' screen is used when the user is prompted to enter 86 // an existing passphrase. 87 void OnPassphraseEntry(const std::string& passphrase); 89 // The user canceled the passphrase entry without supplying a passphrase. 92 // The 'first passphrase' screen is for users migrating from a build 93 // without passwords, who are prompted to make a passphrase choice. 96 const std::string& passphrase); 145 // Set to true if we've tried creating/setting an explicit passphrase, s [all...] |