/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase t [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
H A D | certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]); 54 PKEYFromPEM(std::string pem, std::string passphrase) argument 63 PKEYToPEM(EVP_PKEY* pkey, std::string passphrase) argument
|
/external/openssh/contrib/ |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1051 char *passphrase; member in struct:passphrase_test 1161 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1220 if (pbkdf2_sha1(test->passphrase,
|
H A D | crypto_openssl.c | 802 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 805 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1051 char *passphrase; member in struct:passphrase_test 1161 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1220 if (pbkdf2_sha1(test->passphrase,
|
H A D | crypto_openssl.c | 802 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 805 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1051 char *passphrase; member in struct:passphrase_test 1161 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1220 if (pbkdf2_sha1(test->passphrase,
|
H A D | crypto_openssl.c | 802 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 805 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/openssh/ |
H A D | authfile.c | 77 const char *passphrase, const char *comment, 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, 198 sshkey_load_private_type(int type, const char *filename, const char *passphrase, argument 221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); 228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, argument 240 passphrase, keyp, commentp)) != 0) 253 sshkey_load_private(const char *filename, const char *passphrase, argument 275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename, 436 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, argument 458 passphrase, 76 sshkey_save_private(struct sshkey *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument [all...] |
H A D | sshconnect1.c | 224 char buf[300], *passphrase, *comment, *authfile; local 265 * load the private key. Try first with empty passphrase; if it 266 * fails, ask for a passphrase. 275 "Enter passphrase for RSA key '%.100s': ", comment); 277 passphrase = read_passphrase(buf, 0); 278 if (strcmp(passphrase, "") != 0) { 280 authfile, passphrase, NULL, NULL); 283 debug2("no passphrase given, try next key"); 286 explicit_bzero(passphrase, strlen(passphrase)); [all...] |
H A D | cipher.c | 484 * passphrase and using the resulting 16 bytes as the key. 488 const char *passphrase, int do_encrypt) 494 passphrase, strlen(passphrase), 487 cipher_set_key_string(struct sshcipher_ctx *cc, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
|
H A D | key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, argument 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, 360 key_load_private(const char *path, const char *passphrase, argument 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { 380 key_load_private_cert(int type, const char *filename, const char *passphrase, argument 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, 401 key_load_private_type(int type, const char *filename, const char *passphrase, argument 407 if ((r = sshkey_load_private_type(type, filename, passphrase,
|
H A D | ssh-keygen.c | 68 * Flag indicating that we just want to change the passphrase. This can be 104 /* This is set to the passphrase if given on the command line. */ 107 /* This is set to the new passphrase if given on the command line. */ 288 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN); 1240 * Perform changing a passphrase. The argument is the passwd structure 1258 /* Try to load the file with empty passphrase. */ 1265 read_passphrase("Enter old passphrase: ", 1282 /* Ask the new passphrase (twice). */ 1288 read_passphrase("Enter new passphrase (empty for no " 1289 "passphrase) 1364 char new_comment[1024], *comment, *passphrase; local [all...] |
H A D | sshconnect2.c | 1131 char prompt[300], *passphrase; local 1141 "Enter passphrase for key '%.100s': ", filename); 1144 passphrase = ""; 1146 passphrase = read_passphrase(prompt, 0); 1147 if (*passphrase == '\0') { 1148 debug2("no passphrase given, try next key"); 1149 free(passphrase); 1154 passphrase, &private, NULL, &perm_ok))) { 1163 debug2("bad passphrase given, try again..."); 1179 explicit_bzero(passphrase, strle [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_auth.c | 426 char *passphrase, *strpassphrase; local 434 passphrase = radius_msg_get_tunnel_password( 441 if (passphrase == NULL) 444 * passphrase does not contain the NULL termination. 450 os_memcpy(strpassphrase, passphrase, passphraselen); 461 os_free(passphrase);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.c | 426 char *passphrase, *strpassphrase; local 434 passphrase = radius_msg_get_tunnel_password( 441 if (passphrase == NULL) 444 * passphrase does not contain the NULL termination. 450 os_memcpy(strpassphrase, passphrase, passphraselen); 461 os_free(passphrase);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 426 char *passphrase, *strpassphrase; local 434 passphrase = radius_msg_get_tunnel_password( 441 if (passphrase == NULL) 444 * passphrase does not contain the NULL termination. 450 os_memcpy(strpassphrase, passphrase, passphraselen); 461 os_free(passphrase);
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.h | 117 * passphrase - WPA2-Personal passphrase for the group (GO only) 119 char passphrase[64]; member in struct:p2p_go_neg_results 514 * This parameter controls the length of the random passphrase that is
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p.h | 117 * passphrase - WPA2-Personal passphrase for the group (GO only) 119 char passphrase[64]; member in struct:p2p_go_neg_results 514 * This parameter controls the length of the random passphrase that is
|