Searched defs:passphrase (Results 1 - 25 of 40) sorted by relevance

12

/external/curl/tests/unit/
H A Dunit1394.c45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
100 if(passphrase) {
101 if(strcmp(p[2], passphrase)) {
102 printf("expected passphrase '%s' but got '%s'"
103 "for -E param '%s'\n", p[2], passphrase, p[0]);
107 printf("expected passphrase '%s' but got NULL "
112 if(passphrase) {
113 printf("expected passphrase NUL
119 if(passphrase) free(passphrase); variable
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6
[all...]
H A Dconfig_ssid.h164 * passphrase - WPA ASCII passphrase
166 * If this is set, psk will be generated using the SSID and passphrase
167 * configured for the network. ASCII passphrase must be between 8 and
170 char *passphrase; member in struct:wpa_ssid
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase t
[all...]
/external/google-tv-pairing-protocol/cpp/src/polo/util/
H A Dcertificateutil.cc55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
54 PKEYFromPEM(std::string pem, std::string passphrase) argument
63 PKEYToPEM(EVP_PKEY* pkey, std::string passphrase) argument
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1068 char *passphrase; member in struct:passphrase_test
1178 #if 0 /* \0 not currently supported in passphrase parameters.. */
1237 if (pbkdf2_sha1(test->passphrase,
H A Dcrypto_openssl.c870 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
873 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1068 char *passphrase; member in struct:passphrase_test
1178 #if 0 /* \0 not currently supported in passphrase parameters.. */
1237 if (pbkdf2_sha1(test->passphrase,
H A Dcrypto_openssl.c870 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
873 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1068 char *passphrase; member in struct:passphrase_test
1178 #if 0 /* \0 not currently supported in passphrase parameters.. */
1237 if (pbkdf2_sha1(test->passphrase,
H A Dcrypto_openssl.c870 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
873 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
/external/libweave/examples/provider/
H A Dwifi_manager.cc80 const std::string& passphrase,
108 {"dev", "wifi", "connect", ssid, "password", passphrase});
123 passphrase, pid, until, callback),
128 const std::string& passphrase,
140 TryToConnect(ssid, passphrase, 0,
79 TryToConnect(const std::string& ssid, const std::string& passphrase, int pid, base::Time until, const DoneCallback& callback) argument
127 Connect(const std::string& ssid, const std::string& passphrase, const DoneCallback& callback) argument
/external/libweave/src/privet/
H A Dwifi_bootstrap_manager.cc104 const std::string& passphrase) {
111 wifi_->Connect(ssid, passphrase,
184 const std::string& passphrase,
192 tasks_weak_factory_.GetWeakPtr(), ssid, passphrase),
103 StartConnecting(const std::string& ssid, const std::string& passphrase) argument
183 ConfigureCredentials(const std::string& ssid, const std::string& passphrase, ErrorPtr* error) argument
H A Dprivet_handler.cc98 const char kSetupStartPassKey[] = "passphrase";
758 std::string passphrase; local
777 wifi->GetString(kSetupStartPassKey, &passphrase);
801 if (!ssid.empty() && !wifi_->ConfigureCredentials(ssid, passphrase, &error))
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11_auth.c435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
487 os_free(passphrase);
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11_auth.c435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
487 os_free(passphrase);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11_auth.c435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
487 os_free(passphrase);
/external/curl/src/
H A Dtool_getparam.c283 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon.
292 char **passphrase)
299 *passphrase = NULL;
306 * means no passphrase was given and no characters escaped */
373 *passphrase = strdup(param_place);
1321 case 'e': /* private key passphrase */
1391 char *certname, *passphrase; local
1392 parse_cert_parameter(nextarg, &certname, &passphrase);
1395 if(passphrase) {
1397 config->key_passwd = passphrase;
290 parse_cert_parameter(const char *cert_parameter, char **certname, char **passphrase) argument
[all...]
/external/curl/lib/
H A Dssh.h110 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
/external/netperf/src/
H A Dnetsh.c222 /* what is the passphrase? */
223 char *passphrase = NULL; variable
240 -Z passphrase Expect passphrase as the first thing received\n\
288 -Z passphrase Set and pass to netserver a passphrase\n";
911 /* only copy as much of the passphrase as could fit in the
918 if (passphrase == NULL)
919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data));
920 strncpy(passphrase,
[all...]
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p.h127 * passphrase - WPA2-Personal passphrase for the group (GO only)
129 char passphrase[64]; member in struct:p2p_go_neg_results
573 * This parameter controls the length of the random passphrase that is
/external/wpa_supplicant_8/src/p2p/
H A Dp2p.h127 * passphrase - WPA2-Personal passphrase for the group (GO only)
129 char passphrase[64]; member in struct:p2p_go_neg_results
573 * This parameter controls the length of the random passphrase that is
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p.h127 * passphrase - WPA2-Personal passphrase for the group (GO only)
129 char passphrase[64]; member in struct:p2p_go_neg_results
573 * This parameter controls the length of the random passphrase that is

Completed in 517 milliseconds

12