/external/curl/tests/unit/ |
H A D | unit1394.c | 45 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 77 char *certname, *passphrase; variable 79 parse_cert_parameter(p[0], &certname, &passphrase); 102 if(passphrase) { 103 if(strcmp(p[2], passphrase)) { 104 printf("expected passphrase '%s' but got '%s'" 105 "for -E param '%s'\n", p[2], passphrase, p[0]); 110 printf("expected passphrase '%s' but got NULL " 116 if(passphrase) { 117 printf("expected passphrase NUL 123 if(passphrase) free(passphrase); variable [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 19 char *ssid, *passphrase, buf[64], *pos; local 22 printf("usage: wpa_passphrase <ssid> [passphrase]\n" 23 "\nIf passphrase is left out, it will be read from " 31 passphrase = argv[2]; 33 printf("# reading passphrase from stdin\n"); 35 printf("Failed to read passphrase\n"); 47 passphrase = buf; 50 if (os_strlen(passphrase) < 8 || os_strlen(passphrase) > 6 [all...] |
H A D | config_ssid.h | 164 * passphrase - WPA ASCII passphrase 166 * If this is set, psk will be generated using the SSID and passphrase 167 * configured for the network. ASCII passphrase must be between 8 and 170 char *passphrase; member in struct:wpa_ssid 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase t [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
H A D | certificateutil.cc | 55 std::string passphrase) { 57 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(bio, NULL, 0, &passphrase[0]); 64 std::string passphrase) { 67 &passphrase[0]); 54 PKEYFromPEM(std::string pem, std::string passphrase) argument 63 PKEYToPEM(EVP_PKEY* pkey, std::string passphrase) argument
|
/external/openssh/contrib/ |
H A D | gnome-ssh-askpass1.c | 26 * This is a simple GNOME SSH passphrase grabber. To use it, set the 70 char *passphrase; local 128 /* Report passphrase if user selected OK */ 129 passphrase = gtk_entry_get_text(GTK_ENTRY(entry)); 131 puts(passphrase); 133 /* Zero passphrase in memory */ 134 memset(passphrase, '\0', strlen(passphrase)); 135 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local 165 message = "Enter your OpenSSH passphrase [all...] |
H A D | gnome-ssh-askpass2.c | 28 * This is a simple GNOME SSH passphrase grabber. To use it, set the 90 char *passphrase, *local; local 166 /* Report passphrase if user selected OK */ 167 passphrase = g_strdup(gtk_entry_get_text(GTK_ENTRY(entry))); 169 local = g_locale_from_utf8(passphrase, strlen(passphrase), 176 puts(passphrase); 180 /* Zero passphrase in memory */ 181 memset(passphrase, '\b', strlen(passphrase)); 182 gtk_entry_set_text(GTK_ENTRY(entry), passphrase); local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1068 char *passphrase; member in struct:passphrase_test 1178 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1237 if (pbkdf2_sha1(test->passphrase,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
H A D | crypto_module_tests.c | 1068 char *passphrase; member in struct:passphrase_test 1178 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1237 if (pbkdf2_sha1(test->passphrase,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-pbkdf2.c | 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, argument 23 size_t passphrase_len = os_strlen(passphrase); 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, 60 * @passphrase: ASCII passphrase 72 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len, argument 82 if (pbkdf2_sha1_f(passphrase, ssid, ssid_len, iterations,
|
/external/libweave/examples/provider/ |
H A D | wifi_manager.cc | 80 const std::string& passphrase, 108 {"dev", "wifi", "connect", ssid, "password", passphrase}); 123 passphrase, pid, until, callback), 128 const std::string& passphrase, 140 TryToConnect(ssid, passphrase, 0, 79 TryToConnect(const std::string& ssid, const std::string& passphrase, int pid, base::Time until, const DoneCallback& callback) argument 127 Connect(const std::string& ssid, const std::string& passphrase, const DoneCallback& callback) argument
|
/external/libweave/src/privet/ |
H A D | wifi_bootstrap_manager.cc | 104 const std::string& passphrase) { 111 wifi_->Connect(ssid, passphrase, 184 const std::string& passphrase, 192 tasks_weak_factory_.GetWeakPtr(), ssid, passphrase), 103 StartConnecting(const std::string& ssid, const std::string& passphrase) argument 183 ConfigureCredentials(const std::string& ssid, const std::string& passphrase, ErrorPtr* error) argument
|
/external/openssh/ |
H A D | authfile.c | 77 const char *passphrase, const char *comment, 85 if ((r = sshkey_private_to_fileblob(key, keyblob, passphrase, comment, 198 sshkey_load_private_type(int type, const char *filename, const char *passphrase, argument 221 r = sshkey_load_private_type_fd(fd, type, passphrase, keyp, commentp); 228 sshkey_load_private_type_fd(int fd, int type, const char *passphrase, argument 240 passphrase, keyp, commentp)) != 0) 253 sshkey_load_private(const char *filename, const char *passphrase, argument 275 (r = sshkey_parse_private_fileblob(buffer, passphrase, filename, 438 sshkey_load_private_cert(int type, const char *filename, const char *passphrase, argument 460 passphrase, 76 sshkey_save_private(struct sshkey *key, const char *filename, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument [all...] |
H A D | sshconnect1.c | 224 char buf[300], *passphrase, *comment, *authfile; local 265 * load the private key. Try first with empty passphrase; if it 266 * fails, ask for a passphrase. 275 "Enter passphrase for RSA key '%.100s': ", comment); 277 passphrase = read_passphrase(buf, 0); 278 if (strcmp(passphrase, "") != 0) { 280 authfile, passphrase, NULL, NULL); 283 debug2("no passphrase given, try next key"); 286 explicit_bzero(passphrase, strlen(passphrase)); [all...] |
H A D | cipher.c | 484 * passphrase and using the resulting 16 bytes as the key. 488 const char *passphrase, int do_encrypt) 494 passphrase, strlen(passphrase), 487 cipher_set_key_string(struct sshcipher_ctx *cc, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
|
H A D | key.c | 294 key_save_private(Key *key, const char *filename, const char *passphrase, argument 300 if ((r = sshkey_save_private(key, filename, passphrase, comment, 360 key_load_private(const char *path, const char *passphrase, argument 366 if ((r = sshkey_load_private(path, passphrase, &ret, commentp)) != 0) { 380 key_load_private_cert(int type, const char *filename, const char *passphrase, argument 386 if ((r = sshkey_load_private_cert(type, filename, passphrase, 401 key_load_private_type(int type, const char *filename, const char *passphrase, argument 407 if ((r = sshkey_load_private_type(type, filename, passphrase,
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 435 char *passphrase; local 443 passphrase = radius_msg_get_tunnel_password( 450 if (passphrase == NULL) 463 * passphrase does not contain the NULL termination. 469 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { 477 os_memcpy(psk->passphrase, passphrase, 487 os_free(passphrase);
|
/external/ImageMagick/MagickCore/ |
H A D | cipher.c | 516 % MagickBooleanType DecipherImage(Image *image,const char *passphrase, 523 % o passphrase: decipher cipher pixels with this passphrase. 547 const char *passphrase,ExceptionInfo *exception) 555 if (passphrase == (const char *) NULL) 557 passkey=StringToStringInfo(passphrase); 742 % MagickBooleanType EncipherImage(Image *image,const char *passphrase, 749 % o passphrase: encipher pixels with this passphrase. 758 const char *passphrase,ExceptionInf 537 DecipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument 747 EncipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument 1106 DecipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument 1162 EncipherImage(Image *image, const char *passphrase,ExceptionInfo *exception) argument [all...] |
/external/curl/src/ |
H A D | tool_getparam.c | 282 /* Split the argument of -E to 'certname' and 'passphrase' separated by colon. 291 char **passphrase) 298 *passphrase = NULL; 305 * means no passphrase was given and no characters escaped */ 372 *passphrase = strdup(param_place); 1337 case 'e': /* private key passphrase */ 1416 char *certname, *passphrase; local 1417 parse_cert_parameter(nextarg, &certname, &passphrase); 1420 if(passphrase) { 1422 config->key_passwd = passphrase; 289 parse_cert_parameter(const char *cert_parameter, char **certname, char **passphrase) argument [all...] |
/external/curl/lib/ |
H A D | ssh.h | 113 const char *passphrase; /* pass-phrase to use */ member in struct:ssh_conn
|
/external/netperf/src/ |
H A D | netsh.c | 222 /* what is the passphrase? */ 223 char *passphrase = NULL; variable 240 -Z passphrase Expect passphrase as the first thing received\n\ 288 -Z passphrase Set and pass to netserver a passphrase\n"; 911 /* only copy as much of the passphrase as could fit in the 918 if (passphrase == NULL) 919 passphrase = malloc(sizeof(netperf_request.content.test_specific_data)); 920 strncpy(passphrase, [all...] |
/external/ImageMagick/MagickWand/ |
H A D | magick-property.c | 2665 % MagickSetPassphrase() sets the passphrase. 2670 % const char *passphrase) 2676 % o passphrase: the passphrase. 2680 const char *passphrase) 2687 (void) SetImageOption(wand->image_info,"authenticate",passphrase); 2617 MagickSetPassphrase(MagickWand *wand, const char *passphrase) argument
|