Searched defs:passphrase (Results 1 - 25 of 32) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6
[all...]
H A Dconfig_ssid.h164 * passphrase - WPA ASCII passphrase
166 * If this is set, psk will be generated using the SSID and passphrase
167 * configured for the network. ASCII passphrase must be between 8 and
170 char *passphrase; member in struct:wpa_ssid
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase t
[all...]
/external/google-tv-pairing-protocol/cpp/src/polo/util/
H A Dcertificateutil.cc55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
54 PKEYFromPEM(std::string pem, std::string passphrase) argument
63 PKEYToPEM(EVP_PKEY* pkey, std::string passphrase) argument
/external/openssh/contrib/
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase
[all...]
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1051 char *passphrase; member in struct:passphrase_test
1161 #if 0 /* \0 not currently supported in passphrase parameters.. */
1220 if (pbkdf2_sha1(test->passphrase,
H A Dcrypto_openssl.c802 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
805 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1051 char *passphrase; member in struct:passphrase_test
1161 #if 0 /* \0 not currently supported in passphrase parameters.. */
1220 if (pbkdf2_sha1(test->passphrase,
H A Dcrypto_openssl.c802 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
805 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1051 char *passphrase; member in struct:passphrase_test
1161 #if 0 /* \0 not currently supported in passphrase parameters.. */
1220 if (pbkdf2_sha1(test->passphrase,
H A Dcrypto_openssl.c802 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
805 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
/external/openssh/
H A Dauthfile.c77 const char *passphrase, const char *comment,
85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment,
198 sshkey_load_private_type(int type, const char *filename, const char *passphrase, argument
221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp);
228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, argument
240 passphrase, keyp, commentp)) != 0)
253 sshkey_load_private(const char *filename, const char *passphrase, argument
275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename,
436 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, argument
458 passphrase,
76 sshkey_save_private(struct sshkey *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument
[all...]
H A Dsshconnect1.c224 char buf[300], *passphrase, *comment, *authfile; local
265 * load the private key. Try first with empty passphrase; if it
266 * fails, ask for a passphrase.
275 "Enter passphrase for RSA key '%.100s': ", comment);
277 passphrase = read_passphrase(buf, 0);
278 if (strcmp(passphrase, "") != 0) {
280 authfile, passphrase, NULL, NULL);
283 debug2("no passphrase given, try next key");
286 explicit_bzero(passphrase, strlen(passphrase));
[all...]
H A Dcipher.c484 * passphrase and using the resulting 16 bytes as the key.
488 const char *passphrase, int do_encrypt)
494 passphrase, strlen(passphrase),
487 cipher_set_key_string(struct sshcipher_ctx *cc, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
H A Dkey.c294 key_save_private(Key *key, const char *filename, const char *passphrase, argument
300 if ((r = sshkey_save_private(key, filename, passphrase, comment,
360 key_load_private(const char *path, const char *passphrase, argument
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) {
380 key_load_private_cert(int type, const char *filename, const char *passphrase, argument
386 if ((r = sshkey_load_private_cert(type, filename, passphrase,
401 key_load_private_type(int type, const char *filename, const char *passphrase, argument
407 if ((r = sshkey_load_private_type(type, filename, passphrase,
H A Dssh-keygen.c68 * Flag indicating that we just want to change the passphrase. This can be
104 /* This is set to the passphrase if given on the command line. */
107 /* This is set to the new passphrase if given on the command line. */
288 pass = read_passphrase("Enter passphrase: ", RP_ALLOW_STDIN);
1240 * Perform changing a passphrase. The argument is the passwd structure
1258 /* Try to load the file with empty passphrase. */
1265 read_passphrase("Enter old passphrase: ",
1282 /* Ask the new passphrase (twice). */
1288 read_passphrase("Enter new passphrase (empty for no "
1289 "passphrase)
1364 char new_comment[1024], *comment, *passphrase; local
[all...]
H A Dsshconnect2.c1131 char prompt[300], *passphrase; local
1141 "Enter passphrase for key '%.100s': ", filename);
1144 passphrase = "";
1146 passphrase = read_passphrase(prompt, 0);
1147 if (*passphrase == '\0') {
1148 debug2("no passphrase given, try next key");
1149 free(passphrase);
1154 passphrase, &private, NULL, &perm_ok))) {
1163 debug2("bad passphrase given, try again...");
1179 explicit_bzero(passphrase, strle
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11_auth.c426 char *passphrase, *strpassphrase; local
434 passphrase = radius_msg_get_tunnel_password(
441 if (passphrase == NULL)
444 * passphrase does not contain the NULL termination.
450 os_memcpy(strpassphrase, passphrase, passphraselen);
461 os_free(passphrase);
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11_auth.c426 char *passphrase, *strpassphrase; local
434 passphrase = radius_msg_get_tunnel_password(
441 if (passphrase == NULL)
444 * passphrase does not contain the NULL termination.
450 os_memcpy(strpassphrase, passphrase, passphraselen);
461 os_free(passphrase);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11_auth.c426 char *passphrase, *strpassphrase; local
434 passphrase = radius_msg_get_tunnel_password(
441 if (passphrase == NULL)
444 * passphrase does not contain the NULL termination.
450 os_memcpy(strpassphrase, passphrase, passphraselen);
461 os_free(passphrase);
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p.h117 * passphrase - WPA2-Personal passphrase for the group (GO only)
119 char passphrase[64]; member in struct:p2p_go_neg_results
514 * This parameter controls the length of the random passphrase that is
/external/wpa_supplicant_8/src/p2p/
H A Dp2p.h117 * passphrase - WPA2-Personal passphrase for the group (GO only)
119 char passphrase[64]; member in struct:p2p_go_neg_results
514 * This parameter controls the length of the random passphrase that is

Completed in 393 milliseconds

12