HomeSort by relevance Sort by last modified time
    Searched full:passphrase (Results 51 - 75 of 279) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium/chrome/browser/resources/options/
sync_setup_overlay.html 307 <div id="sync-passphrase-container">
308 <div id="passphrase-encryption-message"
323 <div id="sync-custom-passphrase" hidden>
324 <div id="sync-passphrase-message">
330 <div class="sync-custom-passphrase-input">
331 <input id="custom-passphrase" type="password"
334 <div class="sync-custom-passphrase-input">
335 <input id="confirm-passphrase" type="password"
358 <div id="sync-setup-passphrase" class="hidden">
362 <div id="enter-passphrase">
    [all...]
sync_setup_overlay.js 16 // True if the synced account uses a custom passphrase.
89 $('passphraseForm').onsubmit = $('passphrase-ok').onclick = function() {
93 $('passphrase-cancel').onclick = function() {
115 $('passphrase-ok').disabled = true;
116 $('passphrase-cancel').disabled = true;
122 var result = JSON.stringify({"passphrase": f.passphrase.value});
123 chrome.send("Passphrase", [result]);
140 $('sync-custom-passphrase').hidden = true;
142 $('sync-custom-passphrase').hidden = false
    [all...]
sync_setup_overlay.css 19 #sync-passphrase-container {
23 #sync-custom-passphrase {
27 #sync-passphrase-message {
31 .sync-custom-passphrase-input {
115 #passphrase-encryption-message {
120 #passphrase-input {
153 #sync-passphrase-warning {
  /external/openssh/
ssh-add.0 20 If any file requires a passphrase, ssh-add asks for the passphrase from
21 the user. The passphrase is read from the user's tty. ssh-add retries
22 the last passphrase if multiple identity files are given.
68 If ssh-add needs a passphrase, it will read the passphrase from
72 SSH_ASKPASS and open an X11 window to read the passphrase. This
ssh-add.1 71 If any file requires a passphrase,
73 asks for the passphrase from the user.
74 The passphrase is read from the user's tty.
76 retries the last passphrase if multiple identity files are given.
136 needs a passphrase, it will read the passphrase from the current
146 and open an X11 window to read the passphrase.
ssh-keygen.0 13 ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]
48 name but ``.pub'' appended. The program also asks for a passphrase. The
49 passphrase may be empty to indicate no passphrase (host keys must have an
50 empty passphrase), or it may be a string of arbitrary length. A
51 passphrase is similar to a password, except it can be a phrase with a
57 alphanumeric characters. The passphrase can be changed later by using
60 There is no way to recover a lost passphrase. If the passphrase is lost
77 key file path, an empty passphrase, default bits for the ke
    [all...]
ssh-keygen.1 71 .Op Fl P Ar passphrase
161 The program also asks for a passphrase.
162 The passphrase may be empty to indicate no passphrase
163 (host keys must have an empty passphrase), or it may be a string of
165 A passphrase is similar to a password, except it can be a phrase with a
173 The passphrase can be changed later by using the
177 There is no way to recover a lost passphrase.
178 If the passphrase is lost or forgotten, a new key must be generated
199 an empty passphrase, default bits for the key type, and default comment
    [all...]
ssh-keygen.c 61 * Flag indicating that we just want to change the passphrase. This can be
94 /* This is set to the passphrase if given on the command line. */
97 /* This is set to the new passphrase if given on the command line. */
247 pass = read_passphrase("Enter passphrase: ",
1174 * Perform changing a passphrase. The argument is the passwd structure
1191 /* Try to load the file with empty passphrase. */
1198 read_passphrase("Enter old passphrase: ",
1205 printf("Bad passphrase.\n");
1211 /* Ask the new passphrase (twice). */
1217 read_passphrase("Enter new passphrase (empty for no
1293 char new_comment[1024], *comment, *passphrase; local
    [all...]
  /external/chromium_org/sync/engine/
apply_control_data_updates.cc 87 // handles the case where two clients both set a different passphrase. The
90 // everything with the passphrase of the first client and commit the set of
92 // passphrase, the cryptographer will preserve the encryption keys based on the
93 // local passphrase, while the nigori node will preserve the server encryption
113 // for encryption, but didn't change the passphrase.
144 // passphrase. If we had migrated locally, we will re-migrate when the
145 // pending keys are provided. If we had set a new custom passphrase locally
146 // the user will have another chance to set a custom passphrase later
147 // (assuming they hadn't set a custom passphrase on the other client).
156 // They're both migrated, preserve the local nigori if the passphrase
    [all...]
  /external/chromium/chrome/browser/sync/resources/
configure.html 55 #sync-passphrase-container {
59 #sync-custom-passphrase {
63 #sync-passphrase-message {
67 .sync-custom-passphrase-input {
138 #sync-passphrase-warning {
205 #change-passphrase {
286 // passphrase.
378 // The passphrase, once set, cannot be unset, but we show a reset link.
381 document.getElementById("sync-custom-passphrase").hidden = true;
462 "passphrase": f.passphrase.valu
    [all...]
  /external/chromium/chrome/browser/sync/
sync_setup_wizard.h 33 // Choose what to encrypt and whether to use a passphrase.
35 // Show the screen that prompts for your passphrase
37 // Show the passphrase "first time" screen for migrating users, where all
38 // is explained and they choose between google password/custom passphrase.
  /external/chromium_org/chrome/browser/chromeos/options/
passphrase_textfield.h 27 // Returns the passphrase. If it's unchanged, then returns an empty string.
  /external/chromium_org/chromeos/network/onc/
onc_utils.h 45 // using |passphrase|. The resulting UnencryptedConfiguration is returned. If an
48 const std::string& passphrase,
93 // Decrypts |onc_blob| with |passphrase| if necessary. Clears |network_configs|
101 const std::string& passphrase,
  /external/wpa_supplicant_8/src/crypto/
sha1.h 25 int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
  /external/chromium_org/sync/test/
fake_sync_encryption_handler.h 35 virtual void SetEncryptionPassphrase(const std::string& passphrase,
37 virtual void SetDecryptionPassphrase(const std::string& passphrase) OVERRIDE;
fake_sync_encryption_handler.cc 100 const std::string& passphrase,
107 const std::string& passphrase) {
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
userdatarequest.cpp 68 else if (strcmp(tmp, "PASSPHRASE") == 0) {
69 queryField->setText(tr("Private key passphrase: "));
  /external/chromium_org/chromeos/test/data/network/
invalid_settings_with_repairs.json 143 "Passphrase": "some passphrase",
153 "Passphrase": "some passphrase",
288 "Passphrase": "12345678",
312 "Passphrase": "12345678",
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.cc 70 std::string passphrase; member in struct:__anon9010::SyncConfigInfo
155 // Passphrase settings.
168 if (!result->GetString("passphrase", &config->passphrase)) {
169 DLOG(ERROR) << "GetConfiguration() not passed a passphrase value";
332 // usePassphrase: true if the data is encrypted with a secondary passphrase
333 // show_passphrase: true if a passphrase is needed to decrypt the sync data
358 // IsPassphraseRequiredForDecryption(), because we want to show the passphrase
650 // if (for example) some kind of passphrase error is encountered.
655 if (!configuration.passphrase.empty())
    [all...]
  /external/bison/build-aux/
gnupload 224 # for the passphrase if the script will fail.
243 # Make sure passphrase is not exported in the environment.
244 unset passphrase
249 # 'echo $passphrase' to output the passphrase, so it is important that
255 PATH=/empty echo -n "Enter GPG passphrase: "
257 read -r passphrase
260 passphrase_fd_0="--passphrase-fd 0"
268 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 -ba -o $file.sig $file
326 echo "$passphrase" | $dbg $GPG $passphrase_fd_0 --clearsign $base.directiv
    [all...]
  /external/chromium_org/chrome/browser/sync/test/integration/
two_client_passwords_sync_test.cc 29 static const char* kValidPassphrase = "passphrase!";
30 static const char* kAnotherValidPassphrase = "another passphrase!";
125 ASSERT_TRUE(GetClient(1)->AwaitFullSyncCompletion("Set passphrase."));
265 // Setup 1 with a different passphrase, so that it fails to sync.
281 // Update 1 with the correct passphrase, the password should now sync over.
  /external/chromium/chrome/browser/sync/glue/
sync_backend_host.h 82 // The syncer requires a passphrase to decrypt sensitive
84 // setup by the user as well as anytime any the passphrase is
86 // |passphrase_required_for_decryption| is false, the passphrase is
90 // Called when the passphrase provided by the user is
92 // encrypted using the accepted passphrase.
150 // Called on |frontend_loop_| to asynchronously set the passphrase.
152 // setting a passphrase as opposed to implicitly (from the users' perspective)
154 // *not* override an explicit passphrase set previously.
155 void SetPassphrase(const std::string& passphrase, bool is_explicit);
241 // Whether or not the Nigori node is encrypted using an explicit passphrase
    [all...]
  /external/dropbear/
keyimport.c 53 static sign_key *openssh_read(const char *filename, char *passphrase);
55 char *passphrase);
62 static struct ssh2_userkey *sshcom_read(const char *filename, char *passphrase);
64 char *passphrase);
79 sign_key *import_read(const char *filename, char *passphrase, int filetype) {
82 return openssh_read(filename, passphrase);
87 return sshcom_read(filename, passphrase);
93 int import_write(const char *filename, sign_key *key, char *passphrase,
97 return openssh_write(filename, key, passphrase);
102 return sshcom_write(filename, key, passphrase);
    [all...]
  /external/chromium_org/crypto/
openpgp_symmetric_encryption.cc 101 base::StringPiece passphrase,
105 const std::string combined = salt.as_string() + passphrase.as_string();
191 base::StringPiece passphrase,
204 ParseSymmetricKeyEncrypted(&inner, passphrase, &decryption_context);
371 // ParseSymmetricKeyEncrypted parses a passphrase protected session key. See
375 base::StringPiece passphrase,
413 SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt,
414 passphrase.size() + salt.size(), key);
422 cipher_key_length, hash_function, passphrase, salt,
621 base::StringPiece passphrase) {
693 sizeof(key), HASH_AlgSHA1, passphrase, local
    [all...]
  /external/openssh/contrib/
README 20 passphrase requester. This is highly recommended:
35 A GNOME and Gtk2 passphrase requesters. Use "make gnome-ssh-askpass1" or

Completed in 533 milliseconds

1 23 4 5 6 7 8 91011>>