/aosp_15_r20/external/python/google-auth-library-python/google/auth/transport/ |
D | _mtls_helper.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 30 b"-----BEGIN CERTIFICATE-----.+-----END CERTIFICATE-----\r?\n?", re.DOTALL 34 # "-----BEGIN PRIVATE KEY-----...", 35 # "-----BEGIN EC PRIVATE KEY-----...", 36 # "-----BEGIN RSA PRIVATE KEY-----..." 37 # "-----BEGIN ENCRYPTED PRIVATE KEY-----" 39 b"-----BEGIN [A-Z ]*PRIVATE KEY-----.+-----END [A-Z ]*PRIVATE KEY-----\r?\n?", 47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL 92 passphrase. 100 bytes in PEM format and passphrase bytes. [all …]
|
/aosp_15_r20/external/python/google-auth-library-python/tests/transport/ |
D | test__mtls_helper.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 29 ENCRYPTED_EC_PRIVATE_KEY = b"""-----BEGIN ENCRYPTED PRIVATE KEY----- 35 -----END ENCRYPTED PRIVATE KEY-----""" 37 EC_PUBLIC_KEY = b"""-----BEGIN PUBLIC KEY----- 40 -----END PUBLIC KEY-----""" 42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable 44 -----END PASSPHRASE-----""" 92 KEY = b"""-----BEGIN PRIVATE KEY----- 95 -----END PRIVATE KEY-----""" 96 RSA_KEY = b"""-----BEGIN RSA PRIVATE KEY----- [all …]
|
/aosp_15_r20/frameworks/opt/net/wifi/libs/WifiTrackerLib/tests/ |
D | simulate_wifi.py | 10 # http://www.apache.org/licenses/LICENSE-2.0 20 # verify behavior in the Wi-Fi picker without setting up an actual test environment with real APs. 26 # 2) Open the test device and navigate to the Wi-Fi picker. 32 # Wi-Fi picker through user interaction and visual confirmation. 53 def main() -> None: 144 def testTemplate(method_name, fake_scans, fake_configs, pre_instructions, post_instructions) -> Non… 167 print("---> " + pre_instructions) 172 print("---> " + post_instructions) 179 def testWpa2ScanNoConfigs() -> None: 185 "Should ask for passphrase, then be WPA2 (+ WPA3^ if device supports auto-upgrade)" [all …]
|
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/wifi/aware/functional/ |
D | DataPathTest.py | 3 # Copyright 2017 - The Android Open Source Project 9 # http://www.apache.org/licenses/LICENSE-2.0 30 """Set of tests for Wi-Fi Aware data-path.""" 37 PASSPHRASE = "This is some random passphrase - very very secure!!" variable in DataPathTest 41 PASSPHRASE2 = "This is some random passphrase - very very secure - but diff!!" 46 # message re-transmit counter (increases reliability in open-environment) 48 MSG_RETX_COUNT = 5 # hard-coded max value, internal API 51 # with each other - useful for OOB test cases, where the OOB discovery would 71 """Request a Wi-Fi Aware network. 94 publisher isn't used (existing to test use-case). [all …]
|
D | MacRandomNoLeakageTest.py | 3 # Copyright 2019 - The Android Open Source Project 9 # http://www.apache.org/licenses/LICENSE-2.0 31 """Set of tests for Wi-Fi Aware MAC address randomization of NMI (NAN 44 PASSPHRASE = "This is some random passphrase - very very secure!!" variable in MacRandomNoLeakageTest 118 """Create NDP based on the security type(open, PMK, PASSPHRASE), run socket connect 127 sec_type: NDP security type(open, PMK or PASSPHRASE) 131 passphrase = None 135 passphrase = self.PASSPHRASE 143 passphrase, pmk)) 148 passphrase, pmk)) [all …]
|
/aosp_15_r20/packages/modules/Wifi/framework/java/android/net/wifi/aware/ |
D | WifiAwareDataPathSecurityConfig.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 35 * Wi-Fi Aware data-path security config. The config is used with 37 * to request a secure data-path. 49 * @param passphrase The passphrase to be used to encrypt the link. 54 * encrypting the data-path. See {@link Builder#setPmk(byte[])} 56 * generated by Diffie-Hellman key exchange together with a Pairwise Master Key 58 * the data-path. See {@link Builder#setPmkId(byte[])} 63 @Nullable byte[] pmk, @Nullable byte[] pmkId, @Nullable String passphrase) { in WifiAwareDataPathSecurityConfig() argument 65 mPassphrase = passphrase; in WifiAwareDataPathSecurityConfig() 129 .append(", passphrase=") in toString() [all …]
|
D | WifiAwareNetworkSpecifier.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 41 * Network specifier object used to request a Wi-Fi Aware network. Apps should use the 46 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional 52 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional 59 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional 65 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional 94 * The session ID in which context to request a data-path. Only relevant for IB requests. 100 * The peer ID of the device which the data-path should be connected to. Only relevant for 107 * The peer MAC address of the device which the data-path should be connected to. Only relevant 114 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should [all …]
|
D | WifiAwareUtils.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 30 * Per spec: The Service Name is a UTF-8 encoded string from 1 to 255 bytes in length. The 31 * only acceptable single-byte UTF-8 symbols for a Service Name are alphanumeric values (A-Z, 32 * a-z, 0-9), the hyphen ('-'), the underscore ('_') and the period ('.'). All valid multi-byte 33 * UTF-8 characters are acceptable in a Service Name. 37 throw new IllegalArgumentException("Invalid service name - null"); in validateServiceName() 41 throw new IllegalArgumentException("Invalid service name length - must be between " in validateServiceName() 42 + "1 and 255 bytes (UTF-8 encoding)"); in validateServiceName() 50 || b == '-' || b == '.' || b == '_')) { in validateServiceName() 51 throw new IllegalArgumentException("Invalid service name - illegal characters," in validateServiceName() [all …]
|
/aosp_15_r20/packages/modules/Wifi/framework/java/android/net/wifi/p2p/ |
D | WifiP2pConfig.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 51 * A class representing a Wi-Fi P2p configuration for setting up a connection 62 * The device MAC address uniquely identifies a Wi-Fi p2p device 67 * Wi-Fi Protected Setup information 80 /** Get the passphrase of this P2P configuration, or null if unset. */ 83 return passphrase; in getPassphrase() 87 public String passphrase = ""; field in WifiP2pConfig 122 * IP provisioning via IPv6 link-local, when joining a group as a group client. 160 public static final int GROUP_OWNER_INTENT_AUTO = -1; 210 * @return either a non-negative network ID, or one of [all …]
|
/aosp_15_r20/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 3 * Copyright (c) 2003-2005, Jouni Malinen <[email protected]> 21 char *ssid, *passphrase, buf[64], *pos; in main() local 25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main() 26 "\nIf passphrase is left out, it will be read from " in main() 34 passphrase = argv[2]; in main() 38 fprintf(stderr, "# reading passphrase from stdin\n"); in main() 50 fprintf(stderr, "Failed to read passphrase\n"); in main() 58 buf[sizeof(buf) - 1] = '\0'; in main() 67 passphrase = buf; in main() [all …]
|
/aosp_15_r20/external/curl/tests/unit/ |
H A D | unit1394.c | 21 * SPDX-License-Identifier: curl 47 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */ 82 char *certname, *passphrase; variable 84 parse_cert_parameter(p[0], &certname, &passphrase); 89 "for -E param '%s'\n", p[1], certname, p[0]); 95 "for -E param '%s'\n", p[1], p[0]); 102 "for -E param '%s'\n", certname, p[0]); 107 if(passphrase) { 108 if(strcmp(p[2], passphrase)) { 109 printf("expected passphrase '%s' but got '%s'" [all …]
|
/aosp_15_r20/packages/modules/Wifi/service/tests/wifitests/src/com/android/server/wifi/hal/ |
D | WifiNanIfaceAidlImplTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 120 // Assume both values are non-null in compareHalOuiKeyedDataList() 275 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsDefaults() 278 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsDefaults() 281 collector.checkThat("discoveryWindowIntervalVal-5", default5, in testEnableAndConfigPowerSettingsDefaults() 284 collector.checkThat("discoveryWindowIntervalVal-24", default24, in testEnableAndConfigPowerSettingsDefaults() 298 * using the specified non-interactive values when in that power state. 309 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsNoneInteractive() 312 collector.checkThat("discoveryWindowIntervalVal-5", interactive5, in testEnableAndConfigPowerSettingsNoneInteractive() 315 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsNoneInteractive() [all …]
|
D | WifiNanIfaceHidlImplTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 224 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsDefaults() 227 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsDefaults() 230 collector.checkThat("discoveryWindowIntervalVal-5", default5, in testEnableAndConfigPowerSettingsDefaults() 233 collector.checkThat("discoveryWindowIntervalVal-24", default24, in testEnableAndConfigPowerSettingsDefaults() 240 * using the specified non-interactive values when in that power state. 251 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsNoneInteractive() 254 collector.checkThat("discoveryWindowIntervalVal-5", interactive5, in testEnableAndConfigPowerSettingsNoneInteractive() 257 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsNoneInteractive() 260 collector.checkThat("discoveryWindowIntervalVal-24", interactive24, in testEnableAndConfigPowerSettingsNoneInteractive() [all …]
|
/aosp_15_r20/out/soong/.intermediates/hardware/interfaces/wifi/1.6/android.hardware.wifi-V1.6-java_gen_java/gen/srcs/android/hardware/wifi/V1_6/ |
D | NanDataPathSecurityConfig.java | 6 * Security configuration of the data-path (NDP). Security is enabled if not equal to 12 * Cipher type for data-paths. If |securityType| is |NanDataPathSecurityType.OPEN| then must 13 * be set to |NanCipherSuiteType.NONE|, otherwise a non-|NanCipherSuiteType.NONE| cipher suite 24 * Optional Passphrase. Must be specified (and is only used) if |securityType| is set to 25 * |NanDataPathSecurityType.PASSPHRASE|. 28 * NAN Spec: Appendix: Mapping passphrase to PMK for NCS-SK Cipher Suites 30 public java.util.ArrayList<Byte> passphrase = new java.util.ArrayList<Byte>(); field in NanDataPathSecurityConfig 60 if (!android.os.HidlSupport.deepEquals(this.passphrase, other.passphrase)) { in equals() 75 android.os.HidlSupport.deepHashCode(this.passphrase), in hashCode() 89 builder.append(", .passphrase = "); in toString() [all …]
|
/aosp_15_r20/out/soong/.intermediates/hardware/interfaces/wifi/1.0/android.hardware.wifi-V1.0-java_gen_java/gen/srcs/android/hardware/wifi/V1_0/ |
D | NanDataPathSecurityConfig.java | 6 * Security configuration of the data-path (NDP). Security is required if not equal to 12 * Cipher type for data-paths. If |securityType| is |NanDataPathSecurityType.OPEN| then must 13 * be set to |NanCipherSuiteType.NONE|, otherwise a non-|NanCipherSuiteType.NONE| cipher suite 24 * Optional Passphrase. Must be specified (and is only used) if |securityType| is set to 25 * |NanDataPathSecurityType.PASSPHRASE|. 28 * NAN Spec: Appendix: Mapping pass-phrase to PMK for NCS-SK Cipher Suites 30 public java.util.ArrayList<Byte> passphrase = new java.util.ArrayList<Byte>(); field in NanDataPathSecurityConfig 53 if (!android.os.HidlSupport.deepEquals(this.passphrase, other.passphrase)) { in equals() 65 android.os.HidlSupport.deepHashCode(this.passphrase)); in hashCode() 78 builder.append(", .passphrase = "); in toString() [all …]
|
/aosp_15_r20/packages/modules/Wifi/framework/java/android/net/wifi/ |
D | WifiNetworkSuggestion.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 54 * The Network Suggestion object is used to provide a Wi-Fi network for consideration when 55 * auto-connecting to networks. Apps cannot directly create this object, they must use 69 * Generate a randomized MAC from a secret seed and information from the Wi-Fi configuration 76 * With this option, the randomized MAC address will periodically get re-randomized, and 84 private static final int UNASSIGNED_PRIORITY = -1; 109 * Pre-shared key for use with WPA-PSK networks. 113 * Pre-shared key for use with WPA3-SAE networks. 118 * certificates and other settings associated with the WPA/WPA2-Enterprise networks. 123 * certificates and other settings associated with the WPA3-Enterprise networks. [all …]
|
D | WifiNetworkSpecifier.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 46 * Network specifier object used to request a Wi-Fi network. Apps should use the 49 * This specifier can be used to request a local-only connection on devices that support concurrent 52 * targets SDK ≥ {@link android.os.Build.VERSION_CODES#S} or is a system app. These local-only 57 * This specifier can also be used to listen for connected Wi-Fi networks on a particular band. 162 * Pre-shared key for use with WPA-PSK networks. 166 * Pre-shared key for use with WPA3-SAE networks. 171 * certificates and other settings associated with the WPA/WPA2-Enterprise networks. 176 * certificates and other settings associated with the WPA3-Enterprise networks. 180 * Indicate what type this WPA3-Enterprise network is. [all …]
|
/aosp_15_r20/packages/modules/Wifi/service/tests/wifitests/src/com/android/server/wifi/aware/ |
D | WifiAwareDataPathStateManagerTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 252 * Post-test validation. 289 collector.checkThat("interface created -- " + i, sAwareInterfacePrefix + i, in testCreateDeleteAllInterfaces() 295 // (3) delete all interfaces [one unsuccessfully] - note that will not necessarily be in testCreateDeleteAllInterfaces() 316 collector.checkThat("interface deleted -- " + i, done[i], equalTo(true)); in testCreateDeleteAllInterfaces() 326 collector.checkThat("interface delete pre-create -- " + i, in testCreateDeleteAllInterfaces() 333 collector.checkThat("interface created -- " + i, sAwareInterfacePrefix + i, in testCreateDeleteAllInterfaces() 349 final String passphrase = "SomeSecurePassword"; in testDataPathWithPortInfoOnSubscriber() local 361 null, passphrase, false, 0, 5, 6); in testDataPathWithPortInfoOnSubscriber() 371 // do not create a data-path! in testDataPathWithPortInfoOnSubscriber() [all …]
|
/aosp_15_r20/hardware/interfaces/wifi/supplicant/1.2/vts/functional/ |
H A D | supplicant_p2p_iface_hidl_test.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 #include <android-base/logging.h> 35 constexpr uint8_t kTestSsid[] = {'D', 'I', 'R', 'E', 'C', 'T', '-', 'x', 36 'y', '-', 'H', 'E', 'L', 'L', 'O'}; 46 GTEST_SKIP() << "Wi-Fi Direct is not supported, skip this test."; in SetUp() 62 std::string passphrase = kTestPassphrase; in TEST_P() local 69 p2p_iface_->addGroup_1_2(ssid, passphrase, persistent, freq, zero_mac_addr, in TEST_P() 81 std::string passphrase = kTestPassphrase; in TEST_P() local 88 p2p_iface_->addGroup_1_2( in TEST_P() 89 ssid, passphrase, persistent, freq, zero_mac_addr, is_join, in TEST_P() [all …]
|
/aosp_15_r20/external/wpa_supplicant_8/hostapd/ |
H A D | hostapd.wpa_psk | 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 5 # characters or as a 256-bit hex PSK (64 hex digits). 13 # per-Enrollee PSK. 14 00:00:00:00:00:00 secret passphrase 15 00:11:22:33:44:55 another passphrase 17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid 18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid 19 wps=1 00:00:00:00:00:00 passphrase for WPS 20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS 21 00:00:00:00:00:00 another passphrase for all STAs
|
/aosp_15_r20/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-pbkdf2.c | 2 * SHA1-based key derivation function (PBKDF2) for IEEE 802.11i 3 * Copyright (c) 2003-2005, Jouni Malinen <[email protected]> 14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument 23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f() 33 * Uc = PRF(P, Uc-1) in pbkdf2_sha1_f() 40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f() 42 return -1; in pbkdf2_sha1_f() 46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f() 48 return -1; in pbkdf2_sha1_f() 61 * pbkdf2_sha1 - SHA1-based key derivation function (PBKDF2) for IEEE 802.11i [all …]
|
/aosp_15_r20/external/autotest/client/cros/scripts/ |
H A D | wifi | 4 # Use of this source code is governed by a BSD-style license that can be 40 print(cmd, 'connect <ssid> [passphrase] [security]') 41 print(' |security| defaults to "psk" when |passphrase|', end=' ') 51 print(cmd, 'configure <ssid> [passphrase] [security]') 52 print(' |security| defaults to "psk" when |passphrase|', end=' ') 57 def configure(ssid, security, passphrase): argument 60 if passphrase is not None: 61 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase 80 like the passphrase for psk security. 131 like the passphrase for psk security. [all …]
|
/aosp_15_r20/frameworks/opt/tv/tvsystem/java/com/android/libraries/tv/tvsystem/wifi/ |
D | SoftApConfiguration.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 42 * Apps can use this to configure a local-only hotspot using 54 * SSID for the AP, or null for a framework-determined SSID. 59 * BSSID for the AP, or null to use a framework-determined BSSID. 64 * Pre-shared key for WPA2-PSK encryption (non-null enables WPA2-PSK). 205 * @throws IllegalArgumentException when the given BSSID is the all-zero or broadcast MAC 220 * Specifies that this AP should use WPA2-PSK with the given passphrase. When set to null 223 * @param passphrase The passphrase to use, or null to unset a previously-set WPA2-PSK 226 * @throws IllegalArgumentException when the passphrase is the empty string 229 public Builder setWpa2Passphrase(@Nullable String passphrase) { in setWpa2Passphrase() argument [all …]
|
/aosp_15_r20/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
H A D | wpa_passphrase.sgml | 1 <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"> 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 20 <arg><replaceable>passphrase</replaceable></arg> 27 <para><command>wpa_passphrase</command> pre-computes PSK entries for 29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase 30 and SSID are used to generate a 256-bit PSK.</para> 39 <para>The SSID whose passphrase should be derived.</para> 44 <term>passphrase</term> 46 <para>The passphrase to use. If not included on the command line, 47 passphrase will be read from standard input.</para> [all …]
|
/aosp_15_r20/prebuilts/go/linux-x86/src/crypto/cipher/ |
D | example_test.go | 2 // Use of this source code is governed by a BSD-style 21 // real.) If you want to convert a passphrase to a key, use a suitable 23 // When decoded the key should be 16 bytes (AES-128) or 32 (AES-256). 50 // real.) If you want to convert a passphrase to a key, use a suitable 52 // When decoded the key should be 16 bytes (AES-128) or 32 (AES-256). 79 // real.) If you want to convert a passphrase to a key, use a suitable 104 // CryptBlocks can work in-place if the two arguments are the same. 110 // https://tools.ietf.org/html/rfc5246#section-6.2.3.2. However, it's 122 // real.) If you want to convert a passphrase to a key, use a suitable 129 // https://tools.ietf.org/html/rfc5246#section-6.2.3.2. Here we'll [all …]
|