HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 151 - 175 of 279) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/wpa_supplicant_8/src/wps/
wps_attr_process.c 280 wpa_printf(MSG_INFO, "WPS: WPA/WPA2-Personal passphrase uses "
292 "termination from ASCII passphrase");
wps.h 158 * Force PSK format to be used instead of ASCII passphrase when
675 * passphrase (8..63 characters) or the 32-octet PSK (64 hex
676 * characters). When this is set to the ASCII passphrase, the PSK can
680 * other devices to get the passphrase).
693 * network_key is set to the ASCII passphrase.
  /external/chromium_org/third_party/pexpect/
pxssh.py 225 # and a local ssh 'passphrase' prompt (for unlocking a private key).
227 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT, "(?i)connection closed by remote host"], timeout=login_timeout)
235 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
236 if i==2: # password or passphrase
238 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
241 i = self.expect(["(?i)are you sure you want to continue connecting", original_prompt, "(?i)(?:password)|(?:passphrase for key)", "(?i)permission denied", "(?i)terminal type", TIMEOUT])
  /prebuilts/tools/common/m2/internal/org/apache/commons/commons-parent/9/
commons-parent-9.pom 373 <passphrase>${gpg.passphrase}</passphrase>
449 <passphrase>${gpg.passphrase}</passphrase>
  /prebuilts/tools/common/m2/repository/org/apache/commons/commons-parent/11/
commons-parent-11.pom 388 <passphrase>${gpg.passphrase}</passphrase>
464 <passphrase>${gpg.passphrase}</passphrase>
  /external/openssh/
sshconnect2.c 1317 char prompt[300], *passphrase; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config.c 288 os_free(ssid->passphrase);
289 ssid->passphrase = NULL;
313 wpa_printf(MSG_ERROR, "Line %d: Invalid passphrase "
318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
320 if (ssid->passphrase && os_strlen(ssid->passphrase) == len &&
321 os_memcmp(ssid->passphrase, value, len) == 0)
324 os_free(ssid->passphrase);
325 ssid->passphrase = dup_binstr(value, len);
326 if (ssid->passphrase == NULL
    [all...]
wpa_supplicant.conf 258 # Password (and passphrase, etc.) backend for external storage
599 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
600 # generated using the passphrase and SSID). ASCII passphrase must be between
602 # be used to indicate that the PSK/passphrase is stored in external storage.
605 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
607 # only when the passphrase or SSID has actually changed.
    [all...]
  /external/chromium_org/chrome/browser/chromeos/cros/
network_library_impl_base.cc 732 const std::string& passphrase,
739 connect_data_.passphrase = passphrase;
771 connect_data_.passphrase = config.user_passphrase;
811 wifi->SetEAPPassphrase(data.passphrase);
815 wifi->SetPassphrase(data.passphrase);
856 data.psk_key, data.username, data.passphrase, data.group_name);
861 data.username, data.passphrase, data.group_name);
867 data.username, data.passphrase, data.otp);
    [all...]
native_network_parser.cc 1091 std::string passphrase; local
1165 std::string passphrase; local
    [all...]
  /external/chromium_org/chromeos/network/
network_connection_handler.cc 86 NET_LOG_EVENT("OpenVPN: Passphrase Required", service_path);
92 std::string passphrase; local
96 NET_LOG_EVENT("VPN: Passphrase Required", service_path);
111 "passphrase-required";
350 // If 'passphrase_required' is still true, then the 'Passphrase' property
  /external/wpa_supplicant_8/src/crypto/
crypto_openssl.c 684 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
688 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase),
693 if (PKCS5_PBKDF2_HMAC_SHA1(passphrase, os_strlen(passphrase), ssid,
  /external/chromium/chrome/browser/chromeos/options/
vpn_config_view.cc 292 // Passphrase visible button.
355 // PSK passphrase label, input and visible button.
399 // User passphrase label, input and visble button.
  /external/chromium/chrome/browser/sync/
profile_sync_service_harness.cc 247 // The passphrase has been accepted, and sync has been restarted.
302 // Passphrase is already accepted; don't wait.
308 "Waiting for passphrase accepted.");
  /external/chromium/chrome/browser/chromeos/cros/
network_library.cc 117 const char* kPassphraseProperty = "Passphrase";
320 const char* kErrorBadPassphrase = "bad-passphrase";
329 const char* kErrorPassphraseRequiredMsg = "Passphrase required";
1858 std::string passphrase; local
4323 std::string passphrase; member in struct:chromeos::NetworkLibraryImpl::ConnectData
    [all...]
  /external/chromium/chrome/browser/sync/glue/
sync_backend_host.cc 219 void SyncBackendHost::SetPassphrase(const std::string& passphrase,
238 passphrase, is_explicit));
537 << "passphrase. Silently dropping.";
549 // When a passphrase fails, we just unset our waiting flag and trigger a
760 void SyncBackendHost::Core::DoSetPassphrase(const std::string& passphrase,
763 syncapi_->SetPassphrase(passphrase, is_explicit);
    [all...]
  /external/chromium/chrome/browser/sync/engine/
syncapi.cc     [all...]
  /external/chromium_org/chrome/browser/chromeos/options/
wimax_config_view.cc 90 // If the network requires a passphrase, make sure it is the right length.
243 // Passphrase input
vpn_config_view.h 110 // Get passphrase from input field.
wifi_config_view.h 137 // Returns whether the current configuration requires a passphrase.
  /external/chromium_org/chrome/browser/sync/
sync_global_error_unittest.cc 158 // Test that SyncGlobalError shows an error if a passphrase is required.
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.h 91 // invalid passphrase.
  /external/chromium_org/chromeos/dbus/
shill_service_client_stub.cc 210 std::string passphrase; local
212 flimflam::kPassphraseProperty, &passphrase);
213 if (passphrase == "failure")
227 if (passphrase == "failure") {
  /external/chromium_org/sync/engine/
get_commit_ids_command.h 60 // 2. It requires encryption (either the type is encrypted but a passphrase
  /external/openssh/regress/
README.regress 66 keygen-change.sh: change passphrase for key

Completed in 543 milliseconds

1 2 3 4 5 67 8 91011>>