Home
last modified time | relevance | path

Searched +full:- +full:- +full:passphrase (Results 1 – 25 of 910) sorted by relevance

12345678910>>...37

/aosp_15_r20/external/python/google-auth-library-python/google/auth/transport/
D_mtls_helper.py7 # http://www.apache.org/licenses/LICENSE-2.0
30 b"-----BEGIN CERTIFICATE-----.+-----END CERTIFICATE-----\r?\n?", re.DOTALL
34 # "-----BEGIN PRIVATE KEY-----...",
35 # "-----BEGIN EC PRIVATE KEY-----...",
36 # "-----BEGIN RSA PRIVATE KEY-----..."
37 # "-----BEGIN ENCRYPTED PRIVATE KEY-----"
39 b"-----BEGIN [A-Z ]*PRIVATE KEY-----.+-----END [A-Z ]*PRIVATE KEY-----\r?\n?",
47 b"-----BEGIN PASSPHRASE-----(.+)-----END PASSPHRASE-----", re.DOTALL
92 passphrase.
100 bytes in PEM format and passphrase bytes.
[all …]
/aosp_15_r20/external/python/google-auth-library-python/tests/transport/
Dtest__mtls_helper.py7 # http://www.apache.org/licenses/LICENSE-2.0
29 ENCRYPTED_EC_PRIVATE_KEY = b"""-----BEGIN ENCRYPTED PRIVATE KEY-----
35 -----END ENCRYPTED PRIVATE KEY-----"""
37 EC_PUBLIC_KEY = b"""-----BEGIN PUBLIC KEY-----
40 -----END PUBLIC KEY-----"""
42 PASSPHRASE = b"""-----BEGIN PASSPHRASE----- variable
44 -----END PASSPHRASE-----"""
92 KEY = b"""-----BEGIN PRIVATE KEY-----
95 -----END PRIVATE KEY-----"""
96 RSA_KEY = b"""-----BEGIN RSA PRIVATE KEY-----
[all …]
/aosp_15_r20/frameworks/opt/net/wifi/libs/WifiTrackerLib/tests/
Dsimulate_wifi.py10 # http://www.apache.org/licenses/LICENSE-2.0
20 # verify behavior in the Wi-Fi picker without setting up an actual test environment with real APs.
26 # 2) Open the test device and navigate to the Wi-Fi picker.
32 # Wi-Fi picker through user interaction and visual confirmation.
53 def main() -> None:
144 def testTemplate(method_name, fake_scans, fake_configs, pre_instructions, post_instructions) -> Non…
167 print("---> " + pre_instructions)
172 print("---> " + post_instructions)
179 def testWpa2ScanNoConfigs() -> None:
185 "Should ask for passphrase, then be WPA2 (+ WPA3^ if device supports auto-upgrade)"
[all …]
/aosp_15_r20/tools/test/connectivity/acts_tests/tests/google/wifi/aware/functional/
DDataPathTest.py3 # Copyright 2017 - The Android Open Source Project
9 # http://www.apache.org/licenses/LICENSE-2.0
30 """Set of tests for Wi-Fi Aware data-path."""
37 PASSPHRASE = "This is some random passphrase - very very secure!!" variable in DataPathTest
41 PASSPHRASE2 = "This is some random passphrase - very very secure - but diff!!"
46 # message re-transmit counter (increases reliability in open-environment)
48 MSG_RETX_COUNT = 5 # hard-coded max value, internal API
51 # with each other - useful for OOB test cases, where the OOB discovery would
71 """Request a Wi-Fi Aware network.
94 publisher isn't used (existing to test use-case).
[all …]
DMacRandomNoLeakageTest.py3 # Copyright 2019 - The Android Open Source Project
9 # http://www.apache.org/licenses/LICENSE-2.0
31 """Set of tests for Wi-Fi Aware MAC address randomization of NMI (NAN
44 PASSPHRASE = "This is some random passphrase - very very secure!!" variable in MacRandomNoLeakageTest
118 """Create NDP based on the security type(open, PMK, PASSPHRASE), run socket connect
127 sec_type: NDP security type(open, PMK or PASSPHRASE)
131 passphrase = None
135 passphrase = self.PASSPHRASE
143 passphrase, pmk))
148 passphrase, pmk))
[all …]
/aosp_15_r20/packages/modules/Wifi/framework/java/android/net/wifi/aware/
DWifiAwareDataPathSecurityConfig.java8 * http://www.apache.org/licenses/LICENSE-2.0
35 * Wi-Fi Aware data-path security config. The config is used with
37 * to request a secure data-path.
49 * @param passphrase The passphrase to be used to encrypt the link.
54 * encrypting the data-path. See {@link Builder#setPmk(byte[])}
56 * generated by Diffie-Hellman key exchange together with a Pairwise Master Key
58 * the data-path. See {@link Builder#setPmkId(byte[])}
63 @Nullable byte[] pmk, @Nullable byte[] pmkId, @Nullable String passphrase) { in WifiAwareDataPathSecurityConfig() argument
65 mPassphrase = passphrase; in WifiAwareDataPathSecurityConfig()
129 .append(", passphrase=") in toString()
[all …]
DWifiAwareNetworkSpecifier.java8 * http://www.apache.org/licenses/LICENSE-2.0
41 * Network specifier object used to request a Wi-Fi Aware network. Apps should use the
46 * TYPE: in band, specific peer: role, client_id, session_id, peer_id, pmk/passphrase optional
52 * TYPE: in band, any peer: role, client_id, session_id, pmk/passphrase optional
59 * TYPE: out-of-band: role, client_id, peer_mac, pmk/passphrase optional
65 * TYPE: out-of-band, any peer: role, client_id, pmk/passphrase optional
94 * The session ID in which context to request a data-path. Only relevant for IB requests.
100 * The peer ID of the device which the data-path should be connected to. Only relevant for
107 * The peer MAC address of the device which the data-path should be connected to. Only relevant
114 * The PMK of the requested data-path. Can be null. Only one or none of pmk or passphrase should
[all …]
DWifiAwareUtils.java8 * http://www.apache.org/licenses/LICENSE-2.0
30 * Per spec: The Service Name is a UTF-8 encoded string from 1 to 255 bytes in length. The
31 * only acceptable single-byte UTF-8 symbols for a Service Name are alphanumeric values (A-Z,
32 * a-z, 0-9), the hyphen ('-'), the underscore ('_') and the period ('.'). All valid multi-byte
33 * UTF-8 characters are acceptable in a Service Name.
37 throw new IllegalArgumentException("Invalid service name - null"); in validateServiceName()
41 throw new IllegalArgumentException("Invalid service name length - must be between " in validateServiceName()
42 + "1 and 255 bytes (UTF-8 encoding)"); in validateServiceName()
50 || b == '-' || b == '.' || b == '_')) { in validateServiceName()
51 throw new IllegalArgumentException("Invalid service name - illegal characters," in validateServiceName()
[all …]
/aosp_15_r20/packages/modules/Wifi/framework/java/android/net/wifi/p2p/
DWifiP2pConfig.java8 * http://www.apache.org/licenses/LICENSE-2.0
51 * A class representing a Wi-Fi P2p configuration for setting up a connection
62 * The device MAC address uniquely identifies a Wi-Fi p2p device
67 * Wi-Fi Protected Setup information
80 /** Get the passphrase of this P2P configuration, or null if unset. */
83 return passphrase; in getPassphrase()
87 public String passphrase = ""; field in WifiP2pConfig
122 * IP provisioning via IPv6 link-local, when joining a group as a group client.
160 public static final int GROUP_OWNER_INTENT_AUTO = -1;
210 * @return either a non-negative network ID, or one of
[all …]
/aosp_15_r20/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_passphrase.c2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
3 * Copyright (c) 2003-2005, Jouni Malinen <[email protected]>
21 char *ssid, *passphrase, buf[64], *pos; in main() local
25 printf("usage: wpa_passphrase <ssid> [passphrase]\n" in main()
26 "\nIf passphrase is left out, it will be read from " in main()
34 passphrase = argv[2]; in main()
38 fprintf(stderr, "# reading passphrase from stdin\n"); in main()
50 fprintf(stderr, "Failed to read passphrase\n"); in main()
58 buf[sizeof(buf) - 1] = '\0'; in main()
67 passphrase = buf; in main()
[all …]
/aosp_15_r20/external/curl/tests/unit/
H A Dunit1394.c21 * SPDX-License-Identifier: curl
47 /* -E parameter */ /* exp. cert name */ /* exp. passphrase */
82 char *certname, *passphrase; variable
84 parse_cert_parameter(p[0], &certname, &passphrase);
89 "for -E param '%s'\n", p[1], certname, p[0]);
95 "for -E param '%s'\n", p[1], p[0]);
102 "for -E param '%s'\n", certname, p[0]);
107 if(passphrase) {
108 if(strcmp(p[2], passphrase)) {
109 printf("expected passphrase '%s' but got '%s'"
[all …]
/aosp_15_r20/packages/modules/Wifi/service/tests/wifitests/src/com/android/server/wifi/hal/
DWifiNanIfaceAidlImplTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
120 // Assume both values are non-null in compareHalOuiKeyedDataList()
275 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsDefaults()
278 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsDefaults()
281 collector.checkThat("discoveryWindowIntervalVal-5", default5, in testEnableAndConfigPowerSettingsDefaults()
284 collector.checkThat("discoveryWindowIntervalVal-24", default24, in testEnableAndConfigPowerSettingsDefaults()
298 * using the specified non-interactive values when in that power state.
309 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsNoneInteractive()
312 collector.checkThat("discoveryWindowIntervalVal-5", interactive5, in testEnableAndConfigPowerSettingsNoneInteractive()
315 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsNoneInteractive()
[all …]
DWifiNanIfaceHidlImplTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
224 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsDefaults()
227 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsDefaults()
230 collector.checkThat("discoveryWindowIntervalVal-5", default5, in testEnableAndConfigPowerSettingsDefaults()
233 collector.checkThat("discoveryWindowIntervalVal-24", default24, in testEnableAndConfigPowerSettingsDefaults()
240 * using the specified non-interactive values when in that power state.
251 collector.checkThat("validDiscoveryWindowIntervalVal-5", true, in testEnableAndConfigPowerSettingsNoneInteractive()
254 collector.checkThat("discoveryWindowIntervalVal-5", interactive5, in testEnableAndConfigPowerSettingsNoneInteractive()
257 collector.checkThat("validDiscoveryWindowIntervalVal-24", true, in testEnableAndConfigPowerSettingsNoneInteractive()
260 collector.checkThat("discoveryWindowIntervalVal-24", interactive24, in testEnableAndConfigPowerSettingsNoneInteractive()
[all …]
/aosp_15_r20/out/soong/.intermediates/hardware/interfaces/wifi/1.6/android.hardware.wifi-V1.6-java_gen_java/gen/srcs/android/hardware/wifi/V1_6/
DNanDataPathSecurityConfig.java6 * Security configuration of the data-path (NDP). Security is enabled if not equal to
12 * Cipher type for data-paths. If |securityType| is |NanDataPathSecurityType.OPEN| then must
13 * be set to |NanCipherSuiteType.NONE|, otherwise a non-|NanCipherSuiteType.NONE| cipher suite
24 * Optional Passphrase. Must be specified (and is only used) if |securityType| is set to
25 * |NanDataPathSecurityType.PASSPHRASE|.
28 * NAN Spec: Appendix: Mapping passphrase to PMK for NCS-SK Cipher Suites
30 public java.util.ArrayList<Byte> passphrase = new java.util.ArrayList<Byte>(); field in NanDataPathSecurityConfig
60 if (!android.os.HidlSupport.deepEquals(this.passphrase, other.passphrase)) { in equals()
75 android.os.HidlSupport.deepHashCode(this.passphrase), in hashCode()
89 builder.append(", .passphrase = "); in toString()
[all …]
/aosp_15_r20/out/soong/.intermediates/hardware/interfaces/wifi/1.0/android.hardware.wifi-V1.0-java_gen_java/gen/srcs/android/hardware/wifi/V1_0/
DNanDataPathSecurityConfig.java6 * Security configuration of the data-path (NDP). Security is required if not equal to
12 * Cipher type for data-paths. If |securityType| is |NanDataPathSecurityType.OPEN| then must
13 * be set to |NanCipherSuiteType.NONE|, otherwise a non-|NanCipherSuiteType.NONE| cipher suite
24 * Optional Passphrase. Must be specified (and is only used) if |securityType| is set to
25 * |NanDataPathSecurityType.PASSPHRASE|.
28 * NAN Spec: Appendix: Mapping pass-phrase to PMK for NCS-SK Cipher Suites
30 public java.util.ArrayList<Byte> passphrase = new java.util.ArrayList<Byte>(); field in NanDataPathSecurityConfig
53 if (!android.os.HidlSupport.deepEquals(this.passphrase, other.passphrase)) { in equals()
65 android.os.HidlSupport.deepHashCode(this.passphrase)); in hashCode()
78 builder.append(", .passphrase = "); in toString()
[all …]
/aosp_15_r20/packages/modules/Wifi/framework/java/android/net/wifi/
DWifiNetworkSuggestion.java8 * http://www.apache.org/licenses/LICENSE-2.0
54 * The Network Suggestion object is used to provide a Wi-Fi network for consideration when
55 * auto-connecting to networks. Apps cannot directly create this object, they must use
69 * Generate a randomized MAC from a secret seed and information from the Wi-Fi configuration
76 * With this option, the randomized MAC address will periodically get re-randomized, and
84 private static final int UNASSIGNED_PRIORITY = -1;
109 * Pre-shared key for use with WPA-PSK networks.
113 * Pre-shared key for use with WPA3-SAE networks.
118 * certificates and other settings associated with the WPA/WPA2-Enterprise networks.
123 * certificates and other settings associated with the WPA3-Enterprise networks.
[all …]
DWifiNetworkSpecifier.java8 * http://www.apache.org/licenses/LICENSE-2.0
46 * Network specifier object used to request a Wi-Fi network. Apps should use the
49 * This specifier can be used to request a local-only connection on devices that support concurrent
52 * targets SDK &ge; {@link android.os.Build.VERSION_CODES#S} or is a system app. These local-only
57 * This specifier can also be used to listen for connected Wi-Fi networks on a particular band.
162 * Pre-shared key for use with WPA-PSK networks.
166 * Pre-shared key for use with WPA3-SAE networks.
171 * certificates and other settings associated with the WPA/WPA2-Enterprise networks.
176 * certificates and other settings associated with the WPA3-Enterprise networks.
180 * Indicate what type this WPA3-Enterprise network is.
[all …]
/aosp_15_r20/packages/modules/Wifi/service/tests/wifitests/src/com/android/server/wifi/aware/
DWifiAwareDataPathStateManagerTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
252 * Post-test validation.
289 collector.checkThat("interface created -- " + i, sAwareInterfacePrefix + i, in testCreateDeleteAllInterfaces()
295 // (3) delete all interfaces [one unsuccessfully] - note that will not necessarily be in testCreateDeleteAllInterfaces()
316 collector.checkThat("interface deleted -- " + i, done[i], equalTo(true)); in testCreateDeleteAllInterfaces()
326 collector.checkThat("interface delete pre-create -- " + i, in testCreateDeleteAllInterfaces()
333 collector.checkThat("interface created -- " + i, sAwareInterfacePrefix + i, in testCreateDeleteAllInterfaces()
349 final String passphrase = "SomeSecurePassword"; in testDataPathWithPortInfoOnSubscriber() local
361 null, passphrase, false, 0, 5, 6); in testDataPathWithPortInfoOnSubscriber()
371 // do not create a data-path! in testDataPathWithPortInfoOnSubscriber()
[all …]
/aosp_15_r20/hardware/interfaces/wifi/supplicant/1.2/vts/functional/
H A Dsupplicant_p2p_iface_hidl_test.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
17 #include <android-base/logging.h>
35 constexpr uint8_t kTestSsid[] = {'D', 'I', 'R', 'E', 'C', 'T', '-', 'x',
36 'y', '-', 'H', 'E', 'L', 'L', 'O'};
46 GTEST_SKIP() << "Wi-Fi Direct is not supported, skip this test."; in SetUp()
62 std::string passphrase = kTestPassphrase; in TEST_P() local
69 p2p_iface_->addGroup_1_2(ssid, passphrase, persistent, freq, zero_mac_addr, in TEST_P()
81 std::string passphrase = kTestPassphrase; in TEST_P() local
88 p2p_iface_->addGroup_1_2( in TEST_P()
89 ssid, passphrase, persistent, freq, zero_mac_addr, is_join, in TEST_P()
[all …]
/aosp_15_r20/external/wpa_supplicant_8/hostapd/
H A Dhostapd.wpa_psk4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
5 # characters or as a 256-bit hex PSK (64 hex digits).
13 # per-Enrollee PSK.
14 00:00:00:00:00:00 secret passphrase
15 00:11:22:33:44:55 another passphrase
17 keyid=example_id 00:11:22:33:44:77 passphrase with keyid
18 vlanid=3 00:00:00:00:00:00 passphrase with vlanid
19 wps=1 00:00:00:00:00:00 passphrase for WPS
20 wps=1 11:22:33:44:55:00 dev-specific passphrase for WPS
21 00:00:00:00:00:00 another passphrase for all STAs
/aosp_15_r20/external/wpa_supplicant_8/src/crypto/
H A Dsha1-pbkdf2.c2 * SHA1-based key derivation function (PBKDF2) for IEEE 802.11i
3 * Copyright (c) 2003-2005, Jouni Malinen <[email protected]>
14 static int pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, in pbkdf2_sha1_f() argument
23 size_t passphrase_len = os_strlen(passphrase); in pbkdf2_sha1_f()
33 * Uc = PRF(P, Uc-1) in pbkdf2_sha1_f()
40 if (hmac_sha1_vector((u8 *) passphrase, passphrase_len, 2, addr, len, in pbkdf2_sha1_f()
42 return -1; in pbkdf2_sha1_f()
46 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp, in pbkdf2_sha1_f()
48 return -1; in pbkdf2_sha1_f()
61 * pbkdf2_sha1 - SHA1-based key derivation function (PBKDF2) for IEEE 802.11i
[all …]
/aosp_15_r20/external/autotest/client/cros/scripts/
H A Dwifi4 # Use of this source code is governed by a BSD-style license that can be
40 print(cmd, 'connect <ssid> [passphrase] [security]')
41 print(' |security| defaults to "psk" when |passphrase|', end=' ')
51 print(cmd, 'configure <ssid> [passphrase] [security]')
52 print(' |security| defaults to "psk" when |passphrase|', end=' ')
57 def configure(ssid, security, passphrase): argument
60 if passphrase is not None:
61 security_parameters[wifi.SERVICE_PROPERTY_PASSPHRASE] = passphrase
80 like the passphrase for psk security.
131 like the passphrase for psk security.
[all …]
/aosp_15_r20/frameworks/opt/tv/tvsystem/java/com/android/libraries/tv/tvsystem/wifi/
DSoftApConfiguration.java8 * http://www.apache.org/licenses/LICENSE-2.0
42 * Apps can use this to configure a local-only hotspot using
54 * SSID for the AP, or null for a framework-determined SSID.
59 * BSSID for the AP, or null to use a framework-determined BSSID.
64 * Pre-shared key for WPA2-PSK encryption (non-null enables WPA2-PSK).
205 * @throws IllegalArgumentException when the given BSSID is the all-zero or broadcast MAC
220 * Specifies that this AP should use WPA2-PSK with the given passphrase. When set to null
223 * @param passphrase The passphrase to use, or null to unset a previously-set WPA2-PSK
226 * @throws IllegalArgumentException when the passphrase is the empty string
229 public Builder setWpa2Passphrase(@Nullable String passphrase) { in setWpa2Passphrase() argument
[all …]
/aosp_15_r20/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
H A Dwpa_passphrase.sgml1 <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN">
14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
20 <arg><replaceable>passphrase</replaceable></arg>
27 <para><command>wpa_passphrase</command> pre-computes PSK entries for
29 <filename>wpa_supplicant.conf</filename> file. An ASCII passphrase
30 and SSID are used to generate a 256-bit PSK.</para>
39 <para>The SSID whose passphrase should be derived.</para>
44 <term>passphrase</term>
46 <para>The passphrase to use. If not included on the command line,
47 passphrase will be read from standard input.</para>
[all …]
/aosp_15_r20/prebuilts/go/linux-x86/src/crypto/cipher/
Dexample_test.go2 // Use of this source code is governed by a BSD-style
21 // real.) If you want to convert a passphrase to a key, use a suitable
23 // When decoded the key should be 16 bytes (AES-128) or 32 (AES-256).
50 // real.) If you want to convert a passphrase to a key, use a suitable
52 // When decoded the key should be 16 bytes (AES-128) or 32 (AES-256).
79 // real.) If you want to convert a passphrase to a key, use a suitable
104 // CryptBlocks can work in-place if the two arguments are the same.
110 // https://tools.ietf.org/html/rfc5246#section-6.2.3.2. However, it's
122 // real.) If you want to convert a passphrase to a key, use a suitable
129 // https://tools.ietf.org/html/rfc5246#section-6.2.3.2. Here we'll
[all …]

12345678910>>...37