/external/curl/tests/unit/ |
H A D | unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 100 if(passphrase) { 101 if(strcmp(p[2], passphrase)) { 102 printf("expected passphrase '%s' but got '%s'" 103 "for -E param '%s'\n", p[2], passphrase, p[0]); 107 printf("expected passphrase '%s' but got NULL " 112 if(passphrase) { 113 printf("expected passphrase NUL 119 if(passphrase) free(passphrase); variable [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase t [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
H A D | certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]); 54 PKEYFromPEM(std::string pem, std::string passphrase) argument 63 PKEYToPEM(EVP_PKEY* pkey, std::string passphrase) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1068 char *passphrase; member in struct:passphrase_test 1178 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1237 if (pbkdf2_sha1(test->passphrase,
|
H A D | crypto_openssl.c | 870 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 873 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1068 char *passphrase; member in struct:passphrase_test 1178 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1237 if (pbkdf2_sha1(test->passphrase,
|
H A D | crypto_openssl.c | 870 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 873 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1068 char *passphrase; member in struct:passphrase_test 1178 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1237 if (pbkdf2_sha1(test->passphrase,
|
H A D | crypto_openssl.c | 870 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 873 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
|
/external/libweave/examples/provider/ |
H A D | wifi_manager.cc | 80 const std::string& passphrase, 108 {"dev", "wifi", "connect", ssid, "password", passphrase}); 123 passphrase, pid, until, callback), 128 const std::string& passphrase, 140 TryToConnect(ssid, passphrase, 0, 79 TryToConnect(const std::string& ssid, const std::string& passphrase, int pid, base::Time until, const DoneCallback& callback) argument 127 Connect(const std::string& ssid, const std::string& passphrase, const DoneCallback& callback) argument
|
/external/libweave/src/privet/ |
H A D | wifi_bootstrap_manager.cc | 104 const std::string& passphrase) { 111 wifi_->Connect(ssid, passphrase, 184 const std::string& passphrase, 192 tasks_weak_factory_.GetWeakPtr(), ssid, passphrase), 103 StartConnecting(const std::string& ssid, const std::string& passphrase) argument 183 ConfigureCredentials(const std::string& ssid, const std::string& passphrase, ErrorPtr* error) argument
|
H A D | privet_handler.cc | 98 const char kSetupStartPassKey[] = "passphrase"; 758 std::string passphrase; local 777 wifi->GetString(kSetupStartPassKey, &passphrase); 801 if (!ssid.empty() && !wifi_->ConfigureCredentials(ssid, passphrase, &error))
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/external/curl/src/ |
H A D | tool_getparam.c | 283 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon. 292 char **passphrase) 299 *passphrase = NULL; 306 * means no passphrase was given and no characters escaped */ 373 *passphrase = strdup(param_place); 1321 case 'e': /* private key passphrase */ 1391 char *certname, *passphrase; local 1392 parse_cert_parameter(nextarg, &certname, &passphrase); 1395 if(passphrase) { 1397 config->key_passwd = passphrase; 290 parse_cert_parameter(const char *cert_parameter, char **certname, char **passphrase) argument [all...] |
/external/curl/lib/ |
H A D | ssh.h | 110 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
/external/netperf/src/ |
H A D | netsh.c | 222 /* what is the passphrase? */ 223 char *passphrase = NULL; variable 240 -Z passphrase Expect passphrase as the first thing received\n\ 288 -Z passphrase Set and pass to netserver a passphrase\n"; 911 /* only copy as much of the passphrase as could fit in the 918 if (passphrase == NULL) 919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data)); 920 strncpy(passphrase, [all...] |
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.h | 127 * passphrase - WPA2-Personal passphrase for the group (GO only) 129 char passphrase[64]; member in struct:p2p_go_neg_results 573 * This parameter controls the length of the random passphrase that is
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p.h | 127 * passphrase - WPA2-Personal passphrase for the group (GO only) 129 char passphrase[64]; member in struct:p2p_go_neg_results 573 * This parameter controls the length of the random passphrase that is
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p.h | 127 * passphrase - WPA2-Personal passphrase for the group (GO only) 129 char passphrase[64]; member in struct:p2p_go_neg_results 573 * This parameter controls the length of the random passphrase that is
|