Searched defs:passphrase (Results 1 - 25 of 52) sorted by relevance

123

/external/curl/tests/unit/
H A Dunit1394.c45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
77 char *certname, *passphrase; variable
79 parse_cert_parameter(p[0], &certname, &passphrase);
102 if(passphrase) {
103 if(strcmp(p[2], passphrase)) {
104 printf("expected passphrase '%s' but got '%s'"
105 "for -E param '%s'\n", p[2], passphrase, p[0]);
110 printf("expected passphrase '%s' but got NULL "
116 if(passphrase) {
117 printf("expected passphrase NUL
123 if(passphrase) free(passphrase); variable
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
19 char *ssid, *passphrase, buf[64], *pos; local
22 printf("usage: wpa_passphrase <ssid> [passphrase]\n"
23 "\nIf passphrase is left out, it will be read from "
31 passphrase = argv[2];
33 printf("# reading passphrase from stdin\n");
35 printf("Failed to read passphrase\n");
47 passphrase = buf;
50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6
[all...]
H A Dconfig_ssid.h164 * passphrase - WPA ASCII passphrase
166 * If this is set, psk will be generated using the SSID and passphrase
167 * configured for the network. ASCII passphrase must be between 8 and
170 char *passphrase; member in struct:wpa_ssid
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase t
[all...]
/external/google-tv-pairing-protocol/cpp/src/polo/util/
H A Dcertificateutil.cc55 std::string passphrase) {
57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]);
64 std::string passphrase) {
67 &passphrase[0]);
54 PKEYFromPEM(std::string pem, std::string passphrase) argument
63 PKEYToPEM(EVP_PKEY* pkey, std::string passphrase) argument
/external/openssh/contrib/
H A Dgnome-ssh-askpass1.c26 * This is a simple GNOME SSH passphrase grabber. To use it, set the
70 char *passphrase; local
128 /* Report passphrase if user selected OK */
129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry));
131 puts(passphrase);
133 /* Zero passphrase in memory */
134 memset(passphrase, '\0', strlen(passphrase));
135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
165 message = "Enter your OpenSSH passphrase
[all...]
H A Dgnome-ssh-askpass2.c28 * This is a simple GNOME SSH passphrase grabber. To use it, set the
90 char *passphrase, *local; local
166 /* Report passphrase if user selected OK */
167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry)));
169 local = g_locale_from_utf8(passphrase, strlen(passphrase),
176 puts(passphrase);
180 /* Zero passphrase in memory */
181 memset(passphrase, '\b', strlen(passphrase));
182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1068 char *passphrase; member in struct:passphrase_test
1178 #if 0 /* \0 not currently supported in passphrase parameters.. */
1237 if (pbkdf2_sha1(test->passphrase,
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
H A Dcrypto_module_tests.c1068 char *passphrase; member in struct:passphrase_test
1178 #if 0 /* \0 not currently supported in passphrase parameters.. */
1237 if (pbkdf2_sha1(test->passphrase,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-pbkdf2.c14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument
23 size_t passphrase_len = os_strlen(passphrase);
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len,
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
60 * @passphrase: ASCII passphrase
72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument
82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
/external/libweave/examples/provider/
H A Dwifi_manager.cc80 const std::string& passphrase,
108 {"dev", "wifi", "connect", ssid, "password", passphrase});
123 passphrase, pid, until, callback),
128 const std::string& passphrase,
140 TryToConnect(ssid, passphrase, 0,
79 TryToConnect(const std::string& ssid, const std::string& passphrase, int pid, base::Time until, const DoneCallback& callback) argument
127 Connect(const std::string& ssid, const std::string& passphrase, const DoneCallback& callback) argument
/external/libweave/src/privet/
H A Dwifi_bootstrap_manager.cc104 const std::string& passphrase) {
111 wifi_->Connect(ssid, passphrase,
184 const std::string& passphrase,
192 tasks_weak_factory_.GetWeakPtr(), ssid, passphrase),
103 StartConnecting(const std::string& ssid, const std::string& passphrase) argument
183 ConfigureCredentials(const std::string& ssid, const std::string& passphrase, ErrorPtr* error) argument
/external/openssh/
H A Dauthfile.c77 const char *passphrase, const char *comment,
85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment,
198 sshkey_load_private_type(int type, const char *filename, const char *passphrase, argument
221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp);
228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, argument
240 passphrase, keyp, commentp)) != 0)
253 sshkey_load_private(const char *filename, const char *passphrase, argument
275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename,
438 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, argument
460 passphrase,
76 sshkey_save_private(struct sshkey *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument
[all...]
H A Dsshconnect1.c224 char buf[300], *passphrase, *comment, *authfile; local
265 * load the private key. Try first with empty passphrase; if it
266 * fails, ask for a passphrase.
275 "Enter passphrase for RSA key '%.100s': ", comment);
277 passphrase = read_passphrase(buf, 0);
278 if (strcmp(passphrase, "") != 0) {
280 authfile, passphrase, NULL, NULL);
283 debug2("no passphrase given, try next key");
286 explicit_bzero(passphrase, strlen(passphrase));
[all...]
H A Dcipher.c484 * passphrase and using the resulting 16 bytes as the key.
488 const char *passphrase, int do_encrypt)
494 passphrase, strlen(passphrase),
487 cipher_set_key_string(struct sshcipher_ctx *cc, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
H A Dkey.c294 key_save_private(Key *key, const char *filename, const char *passphrase, argument
300 if ((r = sshkey_save_private(key, filename, passphrase, comment,
360 key_load_private(const char *path, const char *passphrase, argument
366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) {
380 key_load_private_cert(int type, const char *filename, const char *passphrase, argument
386 if ((r = sshkey_load_private_cert(type, filename, passphrase,
401 key_load_private_type(int type, const char *filename, const char *passphrase, argument
407 if ((r = sshkey_load_private_type(type, filename, passphrase,
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11_auth.c435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
487 os_free(passphrase);
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11_auth.c435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
487 os_free(passphrase);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11_auth.c435 char *passphrase; local
443 passphrase = radius_msg_get_tunnel_password(
450 if (passphrase == NULL)
463 * passphrase does not contain the NULL termination.
469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) {
477 os_memcpy(psk->passphrase, passphrase,
487 os_free(passphrase);
/external/ImageMagick/MagickCore/
H A Dcipher.c516 % MagickBooleanType DecipherImage(Image *image,const char *passphrase,
523 % o passphrase: decipher cipher pixels with this passphrase.
547 const char *passphrase,ExceptionInfo *exception)
555 if (passphrase == (const char *) NULL)
557 passkey=StringToStringInfo(passphrase);
742 % MagickBooleanType EncipherImage(Image *image,const char *passphrase,
749 % o passphrase: encipher pixels with this passphrase.
758 const char *passphrase,ExceptionInf
537 DecipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument
747 EncipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument
1106 DecipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument
1162 EncipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument
[all...]
/external/curl/src/
H A Dtool_getparam.c282 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon.
291 char **passphrase)
298 *passphrase = NULL;
305 * means no passphrase was given and no characters escaped */
372 *passphrase = strdup(param_place);
1337 case 'e': /* private key passphrase */
1416 char *certname, *passphrase; local
1417 parse_cert_parameter(nextarg, &certname, &passphrase);
1420 if(passphrase) {
1422 config->key_passwd = passphrase;
289 parse_cert_parameter(const char *cert_parameter, char **certname, char **passphrase) argument
[all...]
/external/curl/lib/
H A Dssh.h113 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
/external/netperf/src/
H A Dnetsh.c222 /* what is the passphrase? */
223 char *passphrase = NULL; variable
240 -Z passphrase Expect passphrase as the first thing received\n\
288 -Z passphrase Set and pass to netserver a passphrase\n";
911 /* only copy as much of the passphrase as could fit in the
918 if (passphrase == NULL)
919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data));
920 strncpy(passphrase,
[all...]
/external/ImageMagick/MagickWand/
H A Dmagick-property.c2665 % MagickSetPassphrase() sets the passphrase.
2670 % const char *passphrase)
2676 % o passphrase: the passphrase.
2680 const char *passphrase)
2687 (void) SetImageOption(wand->image_info,"authenticate",passphrase);
2617 MagickSetPassphrase(MagickWand *wand, const char *passphrase) argument

Completed in 544 milliseconds

123